heroui logo

Executables Or Script Creation In Suspicious Path

Splunk Security Content

View Source
Summary
This detection rule identifies the creation of executables or scripts within suspicious file paths on Windows systems. It utilizes the Endpoint.Filesystem data model to track the creation of files with characteristic extensions (including .exe, .dll, .ps1) in directories commonly associated with evasion tactics, like \windows\fonts\, \users\public\. Attackers often exploit these paths to avoid detection while maintaining persistence. Upon confirming malicious activity, this behavior could enable unauthorized code execution, privilege escalation, or long-term persistence within the compromised environment, representing a considerable security risk.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
ATT&CK Techniques
  • T1036
Created: 2025-01-27