
Summary
The analytic named 'Batch File Write to System32' is designed to monitor and detect potentially malicious activities surrounding the creation of batch files (.bat) within critical system directories on Windows endpoints, specifically the System32 and SysWOW64 directories. Leveraging data from the Endpoint datamodel, particularly focusing on process and filesystem events, this rule aims to identify instances where batch files are written to these directories—a behavior that could indicate malicious intent, such as attempts to establish persistent access or execute unauthorized commands with elevated privileges. The detection process involves tracking Sysmon events (EventID 1 for process creation and EventID 11 for file creation), ensuring that only relevant actions are flagged. Administrators can implement this detection rule to enhance their endpoint security posture, particularly against threats that leverage batch files for automation of attacks or system modifications. False positives may occur in legitimate cases, necessitating careful validation of alerts.
Categories
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1204
- T1204.002
Created: 2024-12-10