
Summary
This detection rule identifies the execution of executable files that originate from the Downloads folder on Windows systems. It specifically looks for executable files with the '.exe' extension, which are commonly associated with malware deployment via social engineering attacks, such as phishing. Threat actors often entice users to download and run these malicious executables, which can facilitate unauthorized access to systems, data exfiltration, or the deployment of additional malware. The logic leverages Windows Sysmon Event Code 1, which captures process creation events, and filters these events to only include those where the executable is launched from the Downloads directory. The results provide a comprehensive overview of the affected hosts, users, and the specific processes involved in the execution, enabling threat detection teams to respond to potential threats quickly.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1204
Created: 2024-02-09