
Summary
This detection rule identifies attempts to create executables in service paths that do not use quotation marks. In Windows, if a path is unquoted, it can lead to various security issues, particularly when a malicious actor places an executable in a higher directory. If an application tries to launch from a poorly defined path, the system might inadvertently run the adversary's executable instead of the legitimate one. The detection logic primarily focuses on monitoring the specific creation of executables at known risk paths without proper quoting. By flagging any attempts to create 'C:\program.exe' without quotes, the rule aims to mitigate risks associated with this attack vector, which is categorized under persistence techniques.
Categories
- Windows
- Endpoint
Data Sources
- File
ATT&CK Techniques
- T1574.009
Created: 2021-12-30