heroui logo

Executable Process from Suspicious Folder

Anvilogic Forge

View Source
Summary
This detection rule targets executable processes initiated from suspicious directories, such as 'Temp', 'Appdata', and 'Downloads', particularly when invoked via PowerShell or similar execution methods. These directories frequently house files that may be exploited by threat actors to execute malicious software unnoticed. The rule identifies event logs where the EventCode is 4104, which corresponds to PowerShell script block logging. By filtering the paths associated with 'Temp', 'Downloads', and 'Appdata', the rule captures any executable instances launched that originate from these questionable locations. The attack vectors linked with this rule involve various threat actors noted for these practices, including APT groups and numerous malware families known for exploiting scripting environments. The logic is implemented in Splunk, aggregating relevant events and presenting a structured overview of detected processes, timestamps, and associated users that could indicate malicious intent.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Script
ATT&CK Techniques
  • T1574.001
  • T1059
  • T1204
  • T1059.007
  • T1218.011
  • T1059.005
Created: 2024-02-09