heroui logo

Process Execution From A Potentially Suspicious Folder

Sigma Rules

View Source
Summary
The rule aims to detect process executions originating from potentially suspicious directories on Windows systems. These directories are generally associated with less common usage or might serve as indicators of malicious activity. The detection is structured to monitor the creation of processes and is particularly focused on paths that, while they may legitimately host files, are often misused by attackers to evade detection. By filtering out known safe executables or common administrative tasks within these directories, the rule enhances focus on genuine threats. The detection method utilizes conditions set against various Windows directory paths, alongside optional filters for known software processes, ensuring high-level alerts for processes originating from uncommon folders. Such meticulous tracking enables quicker identification of malicious discrepancies in process executions, thus improving incident response capabilities.
Categories
  • Windows
Data Sources
  • Process
Created: 2019-01-16