Skip to content

Commit

Permalink
rule: shell file write to suspicious folder
Browse files Browse the repository at this point in the history
  • Loading branch information
Neo23x0 committed Nov 20, 2021
1 parent e73816b commit 1ce65c6
Showing 1 changed file with 44 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
title: Windows Shell File Write to Suspicious Folder
id: 1277f594-a7d1-4f28-a2d3-73af5cbeab43
status: experimental
description: Detects a Windows executable that writes files to suspicious folders
references:
- No references
author: Florian Roth
date: 2021/11/20
logsource:
category: file_event
product: windows
detection:
selection_shells:
Image|endswith:
- '\cmd.exe'
- '\powershell.exe'
- '\wscript.exe'
- '\cscript.exe'
- '\sh.exe'
- '\bash.exe'
- '\msbuild.exe' # https://github.com/elastic/detection-rules/blob/main/rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml
TargetFilename|contains:
- 'C:\Users\Public'
- 'C:\PerfLogs'
selection_program:
Image|endswith:
- '\schtasks.exe'
- '\wmic.exe' # https://app.any.run/tasks/c903e9c8-0350-440c-8688-3881b556b8e0/
- '\mshta.exe'
- '\rundll32.exe'
- '\forfiles.exe'
- '\scriptrunner.exe'
TargetFilename|contains:
- 'C:\Users\Public'
- 'C:\PerfLogs'
- '\AppData\'
- 'C:\Windows\Temp'
condition: 1 of them
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: high

0 comments on commit 1ce65c6

Please sign in to comment.