
Summary
This rule detects suspicious modifications or creations of the Windows Terminal Profile settings file, specifically "settings.json", performed by uncommon processes. The detection logic identifies when processes such as cmd.exe, cscript.exe, mshta.exe, powershell.exe, pwsh.exe, or wscript.exe attempt to interact with the settings.json file located in the user's AppData directory. These processes are traditionally not associated with modifying user settings how Windows Terminal is expected to operate. Therefore, any such action taken by these processes could indicate potential misuse or unauthorized changes to a user's configuration, possibly for persistence or other malicious objectives. The rule is aimed at identifying these attempts in real time to allow for necessary analysis or mitigation measures.
Categories
- Windows
- Endpoint
Data Sources
- File
ATT&CK Techniques
- T1547.015
Created: 2023-07-22