heroui logo

Hiding Files with Attrib.exe

Sigma Rules

View Source
Summary
This detection rule is designed to identify the use of the 'attrib.exe' tool on Windows systems, which can be used to change file attributes, particularly to hide files from users. The detection focuses on process creation logs, specifically looking for instances where 'attrib.exe' is being executed with commands that indicate file hiding (using '+h' flag). The rule includes specific filters to ignore legitimate cases, such as when the tool is used by known services like 'IgfxCUIService.exe', which may also utilize 'attrib.exe' to hide certain file types. By monitoring command line arguments in process creation events, the rule aims to flag suspicious activity that may indicate an attempt to conceal malicious files. Proper tuning is necessary to reduce false positives, ensuring that legitimate use cases of 'attrib.exe' do not trigger alerts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2019-01-16