
Summary
The detection rule titled "Windows Network Access Suspicious desktop.ini Action" focuses on identifying unusual process activities that interact with the 'desktop.ini' file over a network share. The 'desktop.ini' file is commonly used by Windows to customize the display of folders in File Explorer. When accessed in a non-standard or unexpected manner, it may indicate a potential security risk, particularly in post-exploitation scenarios where malicious actors may try to manipulate folder presentations without altering the file content on the disk. The rule monitors specific event logs (EventID 5145) for unauthorized actions such as writing data, deleting, or altering attributes of 'desktop.ini'. This detection aids in recognizing potential manipulation attempts that aim to facilitate persistent threats or evasive tactics by adversaries. It is essential for cybersecurity practitioners to be aware of such signs to adequately respond to and mitigate potential breaches.
Categories
- Windows
- Endpoint
Data Sources
- File
- Network Share
Created: 2021-12-06