heroui logo

Suspicious Process File Path

Splunk Security Content

View Source
Summary
The 'Suspicious Process File Path' analytic identifies potentially malicious processes by examining their file paths against a predefined list of locations commonly associated with malicious activity. This detection utilizes data from various sources, primarily Endpoint Detection and Response (EDR) systems, and focuses on any processes that originate from unusual or atypical paths on Windows endpoints. The rationale for monitoring these non-standard paths is based on the observation that threat actors often attempt to bypass security measures by using unconventional directories to execute unauthorized code. The analytic aggregates detection count and timestamps from the Endpoint Processes data model, filtering specifically for paths identified as suspicious. Upon confirming a suspicious activity, organizations may face risks such as unauthorized software execution and possible system compromises, highlighting the importance of this detection in safeguarding endpoint security.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1543
Created: 2024-12-10