
Summary
The detection rule focuses on the execution of expand.exe, a legitimate Windows command line utility commonly used for extracting files from .cab archives. Threat actors have misused this utility to enable the unpacking of malicious payloads concealed within .cab files on compromised systems. This rule is designed to detect such executions, especially those involving file paths or command lines that suggest malicious activity. The logic leverages various Event Codes related to process creation, filtering for instances of expand.exe associated with specific file extensions or suspicious directories, such as Temporary folders. Proper implementation involves allowlisting expected processes to maintain detection fidelity while minimizing false positives.
Categories
- Windows
- Endpoint
- On-Premise
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1105
- T1564.004
Created: 2024-02-09