
Summary
This detection rule aims to identify potentially malicious use of PowerShell commands that modify Access Control Lists (ACLs) on files located within the Windows directory. By monitoring process creation events that involve PowerShell, specifically looking for the `Set-Acl` cmdlet, the rule captures attempts to alter permissions on sensitive system files. The detection focuses on the command line inputs that indicate setting ACLs with parameters like `-AclObject`, `-Path`, and permissions that grant full control. Given that unauthorized permission changes can be indicative of attack strategies designed to evade defenses, this rule plays a crucial role in maintaining the integrity of system security through proactive monitoring and alerting.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1505.005
Created: 2022-10-18