heroui logo

Windows Files and Dirs Access Rights Modification Via Icacls

Splunk Security Content

View Source
Summary
This detection rule identifies modifications of file and directory access permissions made using tools such as icacls.exe, cacls.exe, or xcacls.exe. These alterations are often employed by Advanced Persistent Threats (APTs) and malicious scripts, such as coinminers, seeking to avoid detection and maintain control over compromised systems. The rule leverages data from various sources including Sysmon and Windows Event Logs, focusing on specific command lines indicative of permission changes. Changes to access rights can significantly hinder investigation processes and enable attackers to maintain persistent access to a system. Security analysts implementing this detection should ensure the ingestion of relevant logs while considering the potential for false positives from legitimate administrative use of ICacls.
Categories
  • Endpoint
Data Sources
  • Pod
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1222.001
  • T1222
Created: 2024-12-16