heroui logo

Adding Hidden File Attribute via Attrib

Elastic Detection Rules

View Source
Summary
The detection rule titled "Adding Hidden File Attribute via Attrib" is designed to identify potential evasion tactics employed by adversaries to conceal malicious activity on Windows systems. The rule specifically monitors for the execution of the 'attrib.exe' utility with command-line arguments that modify file attributes to 'Hidden'. This behavior is indicative of attempts to hide malware or tooling from both users and security analysts, thus complicating detection and response efforts. The rule queries various log data sources over a specified timeframe (9 months) to catch relevant events related to the usage of 'attrib.exe'. The risk score assigned to this rule is 21, categorizing it as low severity but still noteworthy due to its implications for defense evasion and persistence. The author of this rule is Elastic, and the investigation guide details steps for analyzing incidents, identifying affected accounts, and verifying the legitimacy of such actions. Recommendations include isolating suspicious hosts, conducting thorough evaluations of user activities, and implementing additional security measures based on findings from the investigation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Command
  • File
  • Application Log
ATT&CK Techniques
  • T1222
  • T1222.001
  • T1564
  • T1564.001
Created: 2020-02-18