heroui logo

Windows Change File Association Command To Notepad

Splunk Security Content

View Source
Summary
This detection rule identifies attempts to change file association commands for specific file extensions to open with Notepad.exe. It utilizes data from Endpoint Detection and Response (EDR) systems, focusing on command line patterns and registry changes. The behavior of altering file associations is commonly used by malicious actors, notably in ransomware attacks such as the Prestige ransomware, which modifies file extensions to execute Notepad for displaying ransom notes. The rule is built on observables like Windows registry changes, process executions, and command-line arguments related to file associations and Notepad. This approach ensures detection of potentially malicious intent and alerts security teams to investigate further.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1546.001
Created: 2025-10-06