
Summary
The 'Windows Suspicious Process File Path' analytic rule identifies potentially malicious processes that originate from file paths that are not typically associated with legitimate software on Windows systems. By examining logs collected from Endpoint Detection and Response (EDR) agents and focusing on well-known non-standard file paths—like system folders and user directories—it aims to catch adversary techniques that rely on unusual paths to execute malicious code without the need for administrative privileges. Given the nature of its detection, this rule assists in mitigating risks associated with unauthorized software execution and helps prevent system compromises in the environment by monitoring and alerting on unusual process behaviors.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1543
- T1036
- T1036.005
Created: 2025-02-10