heroui logo

Suspicious Recursive Takeown

Sigma Rules

View Source
Summary
The rule identifies potentially malicious usage of the Windows command-line utility 'takeown.exe' which is utilized for taking ownership of files and directories by altering the Discretionary Access Control Lists (DACLs). Adversaries may exploit this command to grant themselves elevated permissions over specific files and folders, thereby evading security measures and gaining unauthorized access to sensitive data. This detection rule looks specifically for instances where 'takeown.exe' is invoked with the flags '/f ' to specify a target file or folder and '/r' to apply this action recursively. The detection setup involves monitoring process creation activities on Windows machines to catch such command invocations, especially those that show abnormal behavior indicative of malicious intent. False positives may arise from legitimate administrative tasks and scripts executed by developers, highlighting the importance of context when reviewing alerts generated by this rule.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1222.001
Created: 2022-01-30