heroui logo

Execution of File Written or Modified by PDF Reader

Elastic Detection Rules

View Source
Summary
This detection rule, titled 'Execution of File Written or Modified by PDF Reader,' aims to identify suspicious file activities linked to PDF reader applications. In many cases, attackers exploit vulnerabilities in PDF software to execute malicious files. This rule utilizes a sequence-based detection methodology, monitoring file write and execution events within a two-hour timeframe. It specifically targets .exe files initiated by known PDF readers (e.g., AcroRd32.exe and others) while filtering out legitimate processes associated with these applications. By analyzing the execution flow, it looks for anomalies that may indicate attempted exploitation or unauthorized activities. The rule's effectiveness is enhanced by integrating with multiple data indices to cover diverse endpoints, making it suitable for product environments with the potential risk of PDF-related attack vectors. Incident response guidance is included for handling detected events, emphasizing the importance of triage, malware analysis, and remediation workflows to mitigate risks associated with such incidents.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1566
  • T1566.001
  • T1566.002
Created: 2020-09-02