heroui logo

Unusual Windows Path Activity

Elastic Detection Rules

View Source
Summary
The 'Unusual Windows Path Activity' detection rule is designed to identify processes initiated from uncommon or atypical file system locations in Windows environments, which may signal potential malware execution or persistence strategies. Traditionally, software in corporate settings is deployed from centralized locations, making execution from user or temporary directories suspicious. Processes originating from these paths could indicate unauthorized software downloads or execution of malicious scripts. The rule employs machine learning algorithms to monitor anomalies in process initiation, helping to flag potential security incidents. False positives might arise from legitimate software activities like updates or troubleshooting procedures, necessitating careful investigation of alerts to ensure accurate security responses.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • File
  • Network Traffic
ATT&CK Techniques
  • T1543
  • T1543.003
  • T1204
  • T1204.002
Created: 2020-03-25