
Summary
This analytic rule detects unauthorized access to the Google Chrome user default directory by non-Chrome processes, indicating potential malicious activity typically associated with exfiltration attempts by malware like Remote Access Trojans (RATs) or advanced persistent threats such as FIN7. It utilizes Windows Security Event logs (Event Code 4663) to monitor for anomalous access patterns to sensitive user data, including login credentials, browsing history, and cookies stored in the Chrome default folder. It is critical as it helps to expose attempts to compromise user data, enabling timely incident response.
Categories
- Endpoint
Data Sources
- Windows Registry
- File
ATT&CK Techniques
- T1555
- T1555.003
Created: 2025-01-27