
Summary
The detection rule addresses the execution of applications or scripts from uncommon file paths on Windows systems, identified through AppLocker event logs. By statistically analyzing execution data, the rule flags file paths with significantly higher execution counts than expected, potentially indicating malicious activities or unauthorized application executions. This detection method is crucial in identifying potential policy violations and malware behavior, as attackers often exploit unconventional execution paths to bypass security measures. The rule utilizes statistical metrics such as averages and standard deviations to define an 'upper bound' for expected execution counts, allowing for the identification of anomalies that warrant further investigation. When implementing this detection rule, it is important to adjust thresholds to minimize false positives associated with legitimate executor users operating outside typical paths, while ensuring prompt responses to genuine threats.
Categories
- Endpoint
Data Sources
- Windows Registry
- Application Log
ATT&CK Techniques
- T1218
- T1562
Created: 2024-11-13