
Potential Ransomware Behavior - High count of Readme files by System
Elastic Detection Rules
View SourceSummary
The rule identifies potential ransomware behavior by monitoring for a high frequency of file creation events associated with the System process (PID 4) on Windows systems. It triggers when 20 or more file creation events occur in close succession using file names resembling common ransomware note keywords (e.g., 'README', 'lock', 'recover'). Investigative actions are recommended to examine the content and nature of these files and any unusual network activity associated with the host. The rule utilizes data from various logs including endpoint events, Windows logs, and security software data, specifically targeting the behavior indicative of ransomware preparation or execution.
Categories
- Endpoint
- Windows
Data Sources
- File
- Process
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1485
- T1021
- T1021.002
Created: 2024-05-03