heroui logo

Writing Of Malicious Files To The Fonts Folder

Sigma Rules

View Source
Summary
This detection rule identifies malicious activity related to unauthorized file creation within the C:\Windows\Fonts\ directory, which is a common tactic used by attackers to evade detection. This location is often overlooked as it does not require administrative privileges for file operations, making it an attractive target for persistence mechanisms. The rule monitors process creation events for a combination of specific command line arguments indicative of file modification, execution, or creation of suspicious files, particularly common script or executable formats that could potentially harbor malware. By analyzing process creation logs, the rule aims to reveal attempts of malicious payloads being hidden in a location conducive for stealthy execution on Windows systems. The rule employs several logical conditions to correlate across different detection patterns to minimize false positives while ensuring true malicious activity is flagged accordingly.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2020-04-21