
Summary
The rule detects the creation of an Alternate Data Stream (ADS) within the NTFS file system that contains an executable. This detection is pivotal as ADS can be used by malicious actors to hide executable files in a manner that evades traditional visibility checks. The mechanism for detection involves monitoring for non-empty Imphash values, which signify executable content within the ADS. The rule is designed to filter out cases where the Imphash is empty (denoted by the hash containing a sequence of zeros), which would indicate that no actual executable is present. This helps in reducing false positives that might arise from common legitimate software behavior, such as installers or browser processes that may use ADS for operational purposes.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Logon Session
- Process
Created: 2018-06-03