
Summary
The detection rule is designed to identify executable files located in the Downloads folder that are missing key metadata fields, specifically FileVersion, Description, Product, or Company. These characteristics suggest that the file may have been created using the py2exe tool, which is often used to package Python programs into standalone executables. The rule employs multiple selections for missing fields, indicating a strong intent to filter out potentially suspicious files that lack this standard information. If any of the defined selections are missing in conjunction with the executable being placed in the Downloads folder, an alert is triggered. The presence of such files can indicate potential malware or unwanted applications that could be executed by users unknowingly. This rule focuses on Windows systems, particularly those affected by malicious scripts or executables, making it essential for maintaining endpoint security.
Categories
- Endpoint
- Windows
Data Sources
- File
- Process
- Application Log
Created: 2018-11-22