heroui logo

Windows Shell/Scripting Application File Write to Suspicious Folder

Sigma Rules

View Source
Summary
The rule detects suspicious file writing activities by Windows shell and scripting applications to specific folders known for being targeted by attackers. It focuses on executable files associated with command line and scripting tools such as PowerShell, CMD, and other shell programs. The detection is structured into two selections: Selection 1 captures shell executions that create files in 'C:\PerfLogs\' and 'C:\Users\Public\', while Selection 2 handles more specialized scripting utilities writing to 'C:\PerfLogs\', 'C:\Users\Public\', and 'C:\Windows\Temp\'. The condition for a detection is met if any one of the selections triggers, ensuring the rule can catch a variety of potential threat vectors. This rule is critical in identifying and mitigating improper use of these powerful tools which are often exploited in an attack sequence.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • File
Created: 2021-11-20