
Summary
This detection rule aims to identify anomalous usage of file permission modification utilities like `cacls.exe`, `xcacls.exe`, or `icacls.exe` on Windows systems, particularly focusing on excessive executions of these processes. Utilized in the context of Endpoint Detection and Response (EDR) telemetry, the rule captures behavioral indicators that may signify a potential compromise, especially if an adversary is trying to manipulate file permissions to hinder discovery or removal of malware artifacts. It thresholds on a specified count of executions over a defined timeframe, flagging cases where a process is executed ten times or more within one minute. This behavior is commonly associated with evasion tactics during post-exploitation phases or during attempts to maintain persistence. The rule is operationalized via a Splunk search that aggregates relevant data and applies filters for precision in detecting these usage patterns.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Windows Registry
ATT&CK Techniques
- T1222
Created: 2024-12-16