heroui logo

Notepad Password Files Discovery

Sigma Rules

View Source
Summary
This detection rule identifies instances where the Notepad application is executed to open files containing the string 'password' in their filenames, which may indicate attempts to access or disclose sensitive credential information. Specifically, the rule monitors the execution of Notepad by checking if the parent process is Explorer and evaluates the command line for specific file extensions that commonly hold password information, including .txt, .csv, .doc, and .xls files. Given the sensitivity of accessing password-related files, this rule is critical for spotting unauthorized access and potential credential theft activities. Notably, legitimate administrative activities (like accessing files from remote hosts) can lead to false positives, and thus require further investigation when detections occur. Overall, this rule is part of a proactive approach to enhance security posture against discovery tactics targeting sensitive information.
Categories
  • Endpoint
Data Sources
  • Process
Created: 2025-02-21