heroui logo

Modify ACL permission To Files Or Folder

Splunk Security Content

View Source
Summary
This rule detects the modification of Access Control List (ACL) permissions on files or folders, an action that is indicative of potential unauthorized access attempts to sensitive data. Specifically, it analyzes processes associated with the modification of permissions such as 'cacls.exe', 'icacls.exe', and 'xcacls.exe'. The primary objective is to identify instances where permissions are changed to make files or folders accessible to everyone or to the SYSTEM account, as this behavior can suggest malicious activity aimed at evading security controls and gaining unauthorized access to files. The detection logic leverages event data from Endpoint Detection and Response (EDR) agents and filters based on command-line arguments used in these processes. Should the activity be verified as malicious, it poses a risk of data breaches or additional system compromises.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1222
Created: 2024-12-16