
Summary
The rule "Suspicious writes to Windows Recycle Bin" is designed to detect anomalous file write operations to the Windows Recycle Bin that are executed by processes other than the standard Windows Explorer. Leveraging the Endpoint.Filesystem and Endpoint.Processes data models in Splunk, this detection is significant because it can reveal attempts by malicious actors to conceal their activities, which may include data theft or ransomware operations. The analytic focuses on identifying write actions to paths that match "*$Recycle.Bin*" and filters out legitimate interactions from the explorer.exe process. If malicious write attempts are confirmed, it can indicate a serious security breach, allowing threat actors to maintain persistence while evading traditional detection strategies. The rule emphasizes the necessity of monitoring both filesystem and process logs to successfully identify such behaviors, underscoring the importance of vigilance in endpoint security management.
Categories
- Windows
- Endpoint
Data Sources
- File
- Process
ATT&CK Techniques
- T1036
Created: 2024-11-13