
Summary
This detection rule focuses on identifying potentially malicious batch commands executed in a Windows environment that are intended for recursive deletion of directories and files. The specific command it looks for includes flags typical of deletion operations popularized by ransomware groups, such as Reddot. It utilizes telemetry from Endpoint Detection and Response (EDR) solutions to monitor command-line executions for indications of data destruction activities. This is significant as these activities suggest attempts to erase data that might be critical for recovery, thereby potentially leading to severe business impacts. The implementation involves ingesting logs accessible through EDR agents, processing them to align with Splunk's data models, and effectively monitoring for suspicious command patterns.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Application Log
- Sensor Health
ATT&CK Techniques
- T1070.004
- T1070
Created: 2024-11-13