
Summary
The detection rule titled 'Executables Or Script Creation In Temp Path' identifies the suspicious creation of executable files or scripts within uncommon directories on Windows systems. Using the Endpoint.Filesystem data model, it scans for files with extensions typical of executables (.exe, .dll, .ps1, etc.) created in directories like \windows\fonts\ and \users\public\. Such behaviors are significant indicators of potential malicious activity, as attackers often utilize these paths to bypass standard security measures and maintain persistence in the system. If this behavior is confirmed malicious, it may enable attackers to execute unauthorized code, escalate their privileges, or sustain their presence within the environment, highlighting a prevalent security threat.
Categories
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1036
Created: 2025-02-11