heroui logo

Created Files by Microsoft Sync Center

Sigma Rules

View Source
Summary
This rule is designed to detect the creation of potentially malicious files by the Microsoft Sync Center (also known as mobsync). The detection logic focuses on events where the process 'mobsync.exe' is responsible for creating files, particularly monitoring for file types that are typically used in attacks, such as '.dll' and '.exe'. The selection criteria ensure that only creations originating from the specified process are considered, reducing the likelihood of false positives. Given its connection to attacks that utilize process hollowing and other forms of execution evasion, this rule is critical for identifying misuse of the Sync Center as a vector for malicious file creation.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • File
Created: 2022-04-28