
Summary
The detection rule titled 'Shim Database File Creation' is designed to monitor and identify the creation of shim database files (with the .sdb extension) in default directories, particularly focusing on actions using the sdbinst.exe application. By leveraging the Endpoint.Filesystem data model, the rule specifically checks for file write activities to the Windows\AppPatch\Custom directory, where these shim files are commonly placed. The detection is critical as shims can manipulate API calls, potentially enabling attackers to circumvent security measures or execute harmful code, thereby posing risks such as unauthorized code execution, privilege escalation, and persistent access within systems. The rule utilizes Sysmon EventID 11 for real-time monitoring and alerts security teams to investigate further if such file creations are detected, especially when correlated with other suspicious events.
Categories
- Windows
- Endpoint
Data Sources
- File
ATT&CK Techniques
- T1546.011
- T1546
Created: 2024-11-13