
Summary
This detection rule aims to identify the use of the `attrib.exe` utility in Windows when it is used to set files, particularly scripts or executables, as system files using the `+s` flag. Such usage is often associated with malicious intent, as it allows files to become hidden from the user and prevents their modification or deletion through standard permissions. This rule specifically targets commands that involve paths commonly exploited by attackers, including user directories and temp storage, while also filtering for file extensions typically associated with scripts and executables. The rule helps mitigate false positives by restricting detection to specific file operations that meet certain criteria, thus focusing on potentially harmful activities while minimizing unnecessary alerts.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-06-28