
Summary
This detection rule identifies anomalous executions of Windows system binaries that should typically reside in specific system folders but are detected executing from unusual paths. It targets a predefined list of common system binaries typically found in Windows directories like C:\Windows\System32 or C:\Windows\SysWOW64. By monitoring process creation events, it flags any execution of these binaries sourced from uncommon directories, potentially indicating malicious activity such as evasion techniques or attempts to disguise malicious activity by leveraging legitimate tools. The rule includes filters to minimize false positives by disregarding legitimate instances involving various system folders, PowerShell executions, and the Windows Subsystem for Linux (WSL). Overall, the rule serves as a robust mechanism in identifying potential unauthorized behavior or compromises within Windows operating systems.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2017-11-27