heroui logo

Use Icacls to Hide File to Everyone

Sigma Rules

View Source
Summary
The detection rule is designed to identify the execution of the `icacls` command on Windows systems when it is used to modify file permissions, specifically by denying access to the 'Everyone' group (represented by the SID `*S-1-1-0`). Such an action is often indicative of attempts to hide malicious files from standard user access. The rule looks for the execution of the `icacls.exe` process, specifically targeting command lines that include the `/deny` argument followed by the SID. This technique can be used by attackers to evade detection by restricting access to files that contain malware or other illicit content.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-07-18