
Summary
This detection rule identifies the execution of the `findstr` command with the `-s` and `-i` flags, which corresponds to searching through subfolders and performing case-insensitive searches, respectively. Attackers may use `findstr`, a Windows command-line tool, to locate files or sift through output from other commands, making this a useful utility for evading detection during reconnaissance efforts. The rule utilizes a combination of command line parameters and file name checks to determine whether the command execution is suspicious or typical administrative activity. The analysis focuses on the command execution pattern, where the presence of both `-s` and `-i` flags indicates potential malicious behavior in the context of attackers searching for sensitive or interesting files. The rule classifies alerts under low severity, recognizing that administrative activities may exhibit similar patterns and could yield false positives. It helps in tightening security by monitoring potential abuse of Windows native commands and enhances visibility into user actions during investigations.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2020-10-05