
Summary
This detection rule focuses on identifying potentially malicious behavior associated with the execution of 'forfiles.exe' from non-default locations. Attackers may leverage 'forfiles.exe' to spawn a custom command shell ('cmd.exe') from the current working directory, allowing them to execute arbitrary commands while masquerading as legitimate Windows processes. The detection criteria hinge on monitoring the command line arguments related to the execution of 'forfiles.exe' and ensuring that 'cmd.exe' is invoked in a way that deviates from its expected usage scenario. The rule checks for specific patterns in the parent command line and command line executions of processes, filtered against standard system paths to reduce false positives.
Categories
- Windows
Data Sources
- Process
Created: 2024-01-05