
Summary
This rule is designed to detect the execution of the \"aspnet_compiler.exe\" process, particularly when invoked in a potentially suspicious manner. The specific conditions being monitored include the execution of the process from known .NET directories, along with command line arguments that point to atypical paths for compilation, such as temporary directories or public user folders. By focusing on this tool and its usage in environments where ASP.NET applications are developed or deployed, the rule helps identify attempts to evade defenses through suspicious behavior during the compilation of ASP.NET applications. The presence of the aspnet_compiler.exe in unusual directories can indicate attempts to execute malicious payloads under the guise of legitimate compilation processes. Overall, this detection focuses on preventing evasion tactics that leverage standard application frameworks to facilitate potentially harmful activities.
Categories
- Endpoint
- Windows
- Application
Data Sources
- Process
Created: 2023-08-14