
Summary
The Samsam Test File Write analytic rule is designed to detect suspicious file creation activities indicative of Samsam ransomware behavior. It specifically monitors for the creation of a file named 'test.txt' within the Windows System32 directory, utilizing file-system activity data from the Endpoint data model, particularly focusing on Sysmon EventID 11 logs. This behavior is notable as the Samsam ransomware has been known to use such file creations as part of its propagation strategy. If this detection triggers, it signifies a potential ransomware attack that could lead to data encryption, widespread system disruption, and significant data loss. Therefore, immediate investigation and response are critical to mitigate risks associated with ransomware deployment.
Categories
- Windows
- Endpoint
Data Sources
- Pod
- File
ATT&CK Techniques
- T1486
Created: 2024-11-13