heroui logo

Suspicious Where Execution

Sigma Rules

View Source
Summary
This rule focuses on detecting the execution of 'where.exe' in the context of suspicious activity related to browser data enumeration. Adversaries may use 'where.exe' to extract sensitive information from browser bookmarks and related files, which could provide insights into the user's personal data such as social media accounts, banking sites, and other internal resources. The detection logic looks for executions of 'where.exe' based on specific command line options that are indicative of attempts to access files containing browser data like bookmarks and cookies. By identifying such behavior, this rule aims to highlight potential reconnaissance activities that may indicate a compromise or probing of the user’s environment.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1217
Created: 2021-12-13