
Summary
This detection rule identifies potentially malicious activity by monitoring file creations in the Windows Startup folder. The rule is aimed at detecting files with specific suspicious extensions such as .vbs, .bat, .ps1, and several others that are commonly associated with persistence mechanisms utilized by attackers to maintain their intrusion. The criteria include checking if a file's path contains the Startup folder path and if its extension matches the known malicious formats. Though some of these file types may have legitimate uses, their presence in the Startup folder — especially when created without user consent — is indicative of an attempt to establish persistence by malicious software. The high level of this rule highlights the importance of vigilance in detecting such potentially harmful behaviors, alerting security teams to investigate further.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2022-08-10