heroui logo

Suspicious File Creation Activity From Fake Recycle.Bin Folder

Sigma Rules

View Source
Summary
This detection rule is designed to identify suspicious file creation activities associated with fake Recycle Bin folders that are often exploited by malicious actors as staging areas for malware payloads. The rule accomplishes this by monitoring file write events that target folders typically named 'RECYCLERS.BIN' or 'RECYCLER.BIN'. These directories mimic legitimate Windows Recycle Bin locations, but their use for file storage may indicate attempts at circumvention of regular security measures. Both the file path of the image and the target filename are evaluated for these folder names. This detection is critical for identifying potential persistence mechanisms that malware may utilize to hide or execute on compromised systems. The rule is intended for use in a Windows environment and operates on high-privilege events that signal potential threats against the integrity of the file system.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2023-07-12