
Summary
This detection rule was created to identify instances where the 'sysprep.exe' process is initiated with a command line that references the 'AppData' folder. The detection is particularly relevant due to its association with the Trojan Syndicasec, as highlighted in the Thrip report by Symantec. The use of the 'AppData' directory in this context is suspicious because it might indicate attempts by malware to hide its activity or manipulate user data stored in this frequently accessed location. The rule focuses on monitoring process creation events on Windows systems and looks for command lines that both end with 'sysprep.exe' and contain references to 'AppData'. Given the potential for legitimate administrative scripts and tools to also trigger this rule, it is acknowledged that there may be false positives based on the unique environment configurations and available scripts. Administrators are encouraged to further investigate any detections to discern malicious behavior from safe operational processes.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
Created: 2018-06-22