heroui logo

Suspicious File Created by ArcSOC.exe

Sigma Rules

View Source
Summary
This rule detects suspicious file creations initiated by the ArcGIS Server process ArcSOC.exe, which is responsible for hosting REST services on an ArcGIS server. The focus is on identifying files with unusual extensions that could represent executable scripts or other potentially malicious payloads. The rule targets specific file types that are commonly associated with attack vectors such as script execution and command and control activities. Given that ArcGIS is typically a trusted application in geographic information systems, this rule aims to flag processes that deviate from expected behavior, thus aiding in the detection of potential compromise or abuse of the server software.
Categories
  • Windows
  • Endpoint
  • Application
  • Infrastructure
Data Sources
  • File
  • Process
Created: 2025-11-25