
Summary
This detection rule is designed to identify suspicious file copy operations involving Windows system directories such as System32, SysWOW64, and WinSxS. It targets the behavior of moving potentially malicious executables, known as LOLBINs (Living Off The Land Binaries), like 'certutil' or 'desktopimgdownldr', to different locations on the system in order to evade detection mechanisms that monitor specific directories. By monitoring process creation events, this rule captures any invocations of command-line utilities (like cmd.exe, PowerShell, xcopy, and robocopy) that may indicate such copy operations are taking place. The rule is configured to trigger when these commands contain references to copy operations directed at system directories, indicating potential misuse of the operating system's functionalities. False positives may occur if legitimate administrative scripts invoke these commands or if the commands are not structured in a way that conforms to the suspicious activity patterns defined.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-07-03