heroui logo

Suspicious Executable File Creation

Sigma Rules

View Source
Summary
This rule is designed to detect the creation of suspicious executable files on Windows systems. It looks for file names and extensions that are commonly associated with malicious activities, particularly those that could exploit unquoted service paths or benign locations for executable files. The rule targets specific suffixes that are often abused, such as `:/$Recycle.Bin.exe`, `:/$Documents and Settings.exe`, and various `.exe` combinations that could lead to privilege escalation or execution of unauthorized code. By monitoring these file creations, organizations can enhance their security posture by identifying potential threats before they can cause harm.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2022-09-05