
Summary
This rule detects the creation of archived files in temporary folders on Windows systems, specifically targeting formats like .zip, .rar, and .tar. Such activities are often indicative of malicious behavior, especially in cases where attackers may be preparing to exfiltrate sensitive or stolen data. By monitoring for these file types within temp directories, security teams can gain early insights into potential data collection efforts and take appropriate action to mitigate risks. The rule leverages Sysmon Event ID 11 to identify relevant file creation events, allowing for efficient tracking of this suspicious behavior.
Categories
- Endpoint
Data Sources
- Windows Registry
- File
ATT&CK Techniques
- T1560
Created: 2024-11-13