heroui logo

Program Files Directory Masquerading

Elastic Detection Rules

View Source
Summary
The "Program Files Directory Masquerading" detection rule is designed to identify potential threats where a process is executed from a directory that mimics the trusted Windows Program Files locations. Given that adversaries may exploit the inherent trust associated with these paths, this rule focuses on filtering executions to capture suspicious activities while excluding known legitimate directories. The rule utilizes EQL (Event Query Language) to assess process execution events on Windows systems, checking if the executable path contains indications of being a masqueraded directory. Notably, the rule has parameters to detect processes that deviate from typical execution scenarios, thus flagging them for further investigation. The guiding premise here is the detection of defense evasion tactics employed by malicious actors, making it crucial for safeguarding against such potential breaches. The rule emphasizes the consideration of parent processes, user privileges, and corroborating logs when analyzing alerts. Moreover, specific investigation and response recommendations are included to ensure thorough security practices are adhered to in the event of a triggered alert.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • Network Traffic
  • File
ATT&CK Techniques
  • T1036
  • T1036.005
Created: 2020-11-18