
Summary
The rule titled "Adobe Hijack Persistence" is designed to detect instances where attackers may replace the executable file "RdrCEF.exe" associated with Adobe Acrobat Reader. This file can be manipulated to maintain persistence on a compromised host, allowing malicious executables to run whenever the legitimate application starts. The rule focuses on monitoring file creation events in specified Adobe directories, specifically for the RdrCEF.exe file. It utilizes EQL (Event Query Language) to filter Windows file events, ensuring only those events indicative of potential hijacking are flagged. To enhance investigation effectiveness, the rule provides guidance on triaging incidents, exploring user accounts involved, and potential false positives, all while emphasizing the importance of responding to identified threats by isolating affected hosts and performing thorough scans.
Categories
- Endpoint
- Windows
Data Sources
- File
- Windows Registry
- Process
- Image
- Network Share
ATT&CK Techniques
- T1574
- T1574.010
- T1554
Created: 2020-02-18