heroui logo

Windows Process Executed From Removable Media

Splunk Security Content

View Source
Summary
The analytic rule "Windows Process Executed From Removable Media" is designed to detect when a process is executed from a removable storage device (USB, for example) in Windows environments. This behavior is problematic as it can indicate malicious actions such as unauthorized access, data exfiltration, or malware execution, typically carried out by adversaries or insiders using removable media as a vector. The rule leverages Windows Event Log Security events (specifically Event ID 4688), as well as Sysmon events (IDs 1, 12, and 13), to monitor processes executed from directories that correspond to a USB drive. The detection searches for processes run from current directories not typically used for system operations and involves checking registry paths that log USB device connections. Effective implementation of this detection requires proper endpoint logging that captures both process execution information and changes to specific registry keys related to USB devices. Possible false positives may occur due to legitimate USB activity, necessitating further investigation by security teams.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1200
  • T1025
  • T1091
Created: 2025-01-17