
Summary
The rule 'Suspicious Image Creation In Appdata Folder' is designed to detect the creation of image files within the AppData folder by processes that reference files in the same directory. This analytic uses the Endpoint.Processes and Endpoint.Filesystem data models and is particularly focused on identifying activities linked to malware, such as the Remcos Remote Access Trojan (RAT). Such malware often captures screenshots, saving them in the AppData folder before sending the data to a command-and-control server. If verified as malicious, this behavior may indicate unauthorized access and data exfiltration, posing risks to sensitive information and user privacy. The detection leverages Sysmon Event IDs to monitor process activities and file creations in real-time and is relevant for organizations aiming to prevent potential data breaches and maintain security protocols for endpoint devices.
Categories
- Endpoint
Data Sources
- Pod
- File
ATT&CK Techniques
- T1113
Created: 2024-11-13