heroui logo

Self Extraction Directive File Created In Potentially Suspicious Location

Sigma Rules

View Source
Summary
This rule is designed to detect the creation of Self Extraction Directive (SED) files in potentially suspicious locations, specifically targeting the use of the IExpress utility. SED files are primarily utilized by IExpress to package applications into self-extracting executables, a legitimate feature often exploited by malicious actors to deliver payloads. By monitoring certain directories frequently targeted for such malicious activities (like ProgramData, Temp, and Windows system directories), the rule aims to identify instances where SED files are created, thereby alerting security teams to potentially unsafe activities. The detection logic implements conditions to filter for file paths that are commonly associated with nefarious behaviors, especially focusing on the creation of files that end with .sed. This proactive approach helps in mitigating threats involving self-extracting malware delivery mechanisms before they can execute their full attack lifecycle.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2024-02-05