
Summary
This detection rule is designed to identify the creation of files with the '.pub' extension in suspicious or uncommon directories on Windows systems. The presence of such files—especially in locations like \AppData\Local\Temp\, \Users\Public\, \Windows\Temp\, and C:\Temp\—can indicate potential malicious activities, as attackers may exploit Microsoft Publisher documents to evade detection and deliver payloads. The rule employs a straightforward selection condition that flags if any file ending with '.pub' is created in the aforementioned directories. The potential risks stem from attackers using Publisher Document files to mask their malicious actions, thus necessitating a vigilant monitoring approach in environments where such files are not standard operational artifacts. Care should be taken to consider legitimate uses of Publisher files that might lead to false positives.
Categories
- Endpoint
- Windows
- Infrastructure
Data Sources
- File
- Process
Created: 2023-02-08