
Summary
This detection rule is designed to identify potentially suspicious file creations within the public folder of Windows systems. The presence of files with specific extensions such as .bat, .dll, .exe, .hta, .js, .ps1, .vbe, and .vbs in the 'C:\Users\Public\' directory can indicate that malicious actors are attempting to execute scripts or binaries that may compromise the system. The rule employs a direct selection condition that flags these file types when they are created in the public folder, acting as an early warning signal for potential threats. The rule is classified as high-level risk due to the serious implications of these file types when misused. However, it is also essential to account for false positives where legitimate administrators may deploy necessary binaries into the public folder for shared access, highlighting the importance of context in interpreting detection alerts.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2025-01-23