
Summary
The detection rule titled "Suspicious Execution from INET Cache" is designed to identify potentially malicious processes that execute from the INetCache folder in Windows. This folder can be a target for adversaries seeking to deliver malicious payloads through the WININET API, taking advantage of the temporary internet files stored there. Specifically, the rule looks for processes that are started by common parent executables such as 'explorer.exe', 'winrar.exe', '7zFM.exe', or 'Bandizip.exe', with arguments or paths indicating they originated from the INetCache directory. The detection uses EQL (Event Query Language) to monitor Windows event logs from various sources including Winlogbeat, Sysmon, and Microsoft Defender for Endpoint. The rule's risk score is high (73), indicating a significant potential threat level, particularly concerning tactics related to initial access and command and control based on identifiable execution patterns by malware.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
- User Account
- Network Traffic
ATT&CK Techniques
- T1566
- T1566.001
- T1105
Created: 2024-02-14