
Summary
This detection rule targets the creation of suspicious files and folders within the user's AppData directory on Windows systems, specifically excluding the common and well-known subdirectories: Local, Roaming, and LocalLow. By focusing on uncommon locations within the AppData folder, the rule aims to identify potential evasion tactics used by malicious actors who may otherwise exploit these directories to avoid detection. The rule triggers on specific file types that are often associated with scripts, executables, and potentially harmful content, which could signify an attempt to execute malicious payloads. The detection primarily uses file event logs to monitor targeted file creations, implementing a selection process to differentiate between normal and suspicious activities based on predefined path patterns and file extensions.
Categories
- Windows
- Endpoint
Data Sources
- File
- Logon Session
Created: 2022-08-05