
Summary
This detection rule identifies the execution of the Notepad++ updater utility (GUP) when it is initiated from processes other than the Notepad++ application itself. The GUP utility is typically used to check for and download updates for the Notepad++ application. However, an attacker might misuse this tool to download potentially malicious files while masquerading as a legitimate application process. The rule specifically looks for instances where GUP.exe is called to download files via HTTP, while ensuring that the parent process is not Notepad++. The aggregation of conditions helps to pinpoint anomalous behavior that deviates from typical Notepad++ usage, thereby indicating a potential command-and-control (C2) operation or file download exploit.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-06-10