
Summary
The 'Suspicious FileFix Execution Pattern' rule identifies potentially malicious activities where attackers manipulate browser functionalities to trick users into executing harmful commands. This attack generally occurs when users are lured to deceptive websites mimicking trusted services, where they could encounter fake CAPTCHA prompts or instructions urging them to use the file explorer to paste clipboard contents. The data on the clipboard often contains commands engineered to download and run malware, particularly tools aimed at stealing sensitive information. The rule utilizes parent-child process relationships to monitor certain browsers (Chrome, Firefox, Edge, Brave) for commands embedded with '#' indicating potential malicious activity. Additionally, it inspects command lines for known Windows command line binaries commonly abused by threat actors. The detection logic requires detection of a browser process as the parent executable and the presence of one or more suspicious command line arguments from specified lists, effectively enhancing security against such social engineering attacks.
Categories
- Windows
- Endpoint
- Network
Data Sources
- Process
Created: 2025-11-24