
Summary
This detection rule identifies the creation of executable files that are named after system processes and located in non-standard directories on Windows operating systems. The primary objective is to unveil potential malicious activity, wherein an attacker attempts to disguise malware as legitimate system executables by placing them in unexpected file paths. The rule monitors for specific files like 'AtBroker.exe', 'cmdl32.exe', and others, while excluding those found in standard system paths (e.g., System32, SysWOW64). Before deploying the rule in production, it is advisable to establish a baseline of normal behavior to minimize false positive alerts that may arise from legitimate application use or testing scenarios. Additionally, the rule specifies conditions that must be met to trigger an alert, indicating a medium level of risk associated with the behavior being monitored.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2020-05-26