
Summary
The rule titled 'Suspicious writes to System Volume Information' is designed to detect unauthorized write operations to the 'System Volume Information' directory, which is critical for system restores and file recovery on Windows systems. The search criteria focus on identifying processes that are not associated with the system process (PID 4) that attempt to write to this protected folder. It utilizes Sysmon's EventID 1, which logs process creation events, and EventCode 11, which captures file creation or deletion activities. By filtering events based on these parameters, the rule returns statistics that include the count of suspicious events, along with the minimum and maximum timestamps for when these activities occurred. It's crucial to ensure that endpoint logs include both process names and command-lines for accurate detection. Keep in mind that legitimate system utilities may also write to this directory, necessitating some level of investigation to differentiate between benign and malicious activities.
Categories
- Windows
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1036
Created: 2024-11-14