
Summary
This detection rule identifies the execution of `InfDefaultInstall.exe` with a command line that references a `.inf` file. This executable, part of Windows, is commonly used to install devices and drivers through INF files. The technique leveraged here involves the use of `scrobj.dll` to execute a script from within the INF file, potentially as part of an attack vector to evade detection by traditional security mechanisms. The rule specifically looks for command lines containing both `InfDefaultInstall.exe` and the `.inf` file extension, indicating the loaded configuration may execute a script or code that could perform malicious activities. Given the involvement of script execution, which is often a hallmark of exploitation and evasion techniques, this rule focuses on monitoring process creation activities on Windows systems to flag suspicious behavior for further investigation.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1218
Created: 2021-07-13