heroui logo

Hiding Files And Directories With Attrib exe

Splunk Security Content

View Source
Summary
This rule detects the use of the Windows command-line utility 'attrib.exe' to hide files and directories by applying the '+h' flag, a tactic commonly utilized by attackers to obscure malicious files from users and security software. The detection leverages data from Endpoint Detection and Response (EDR) agents, focusing specifically on command-line arguments associated with the process 'attrib.exe'. By tracking these actions, the detection rule identifies potential malicious behaviors indicative of persistence mechanisms or data exfiltration efforts by adversaries. Proper implementation requires ingesting relevant endpoint logs, ensuring they are mapped to the Splunk Common Information Model (CIM) to enhance the efficacy of analytics and alerting.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Application Log
  • Process
  • Command
ATT&CK Techniques
  • T1222
  • T1222.001
Created: 2024-12-10