
Summary
The detection rule focuses on monitoring the execution of the 'OpenWith.exe' binary, which is often leveraged by threat actors for bypassing security mechanisms and executing malicious payloads under the guise of legitimate processes. 'OpenWith.exe' is a Windows utility that is used to determine which application to use to open a file type. The rule specifies that if the image path ends with 'OpenWith.exe' and the command line arguments contain '/c', this could indicate potentially malicious behavior. The rule is categorized as a high-level detection and can be useful in an incident response context to identify abnormal usage of this binary. It draws attention to 'OpenWith.exe' but recognizes that such behavior could result from both malicious and benign usage, hence the need for caution and context in interpretation.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2019-10-12