heroui logo

Ryuk Test Files Detected

Splunk Security Content

View Source
Summary
This rule is designed to detect the presence of files on Windows systems that contain the keyword "Ryuk" in their names or paths. Such a detection is significant because files associated with Ryuk ransomware indicate a potential ransomware attack or compromise. The rule utilizes the Endpoint Filesystem data model within Splunk to analyze Sysmon EventID 11 logs, specifically searching for file paths on the C drive that match the specified pattern. Detection of these files prompts immediate investigation due to the ransomware's capabilities, which include encrypting critical data and demanding ransom payments. The rule highlights potential risks associated with these files, including data loss and operational disruption, underscoring the need for proactive security measures.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
ATT&CK Techniques
  • T1486
Created: 2024-11-13