
Summary
The rule 'Unusual File Deletion by Dns.exe' is designed to detect anomalous file deletion activities executed by the Windows DNS service, dns.exe. It specifically monitors for unexpected deletions of files, particularly those ending with 'dns.log', which could signify suspicious behavior, potentially linked to remote code execution or exploitation events, such as those documented in CVE-2020-1350 (SigRed). The detection logic uses a combination of selection for processes whose image paths end with '\dns.exe' while filtering out legitimate dns.log deletions. The rule has a high severity level due to the significant implications of any unusual file deletion by this crucial Windows service. It aims to flag behaviors that deviate from normal operations, which may indicate systemic exploitation attempts that could compromise network security.
Categories
- Windows
- Network
- Endpoint
Data Sources
- Process
- File
Created: 2022-09-27