title: Executables Started in Suspicious Folder status: experimental description: Detects process starts of binaries from a suspicious folder author: Florian Roth date: 2017/10/14 references: - https://github.com/mbevilacqua/appcompatprocessor/blob/master/AppCompatSearch.txt - https://www.secureworks.com/research/bronze-butler-targets-japanese-businesses logsource: product: windows service: sysmon detection: selection: EventID: 1 Image: - 'C:\PerfLogs\\*' - 'C:\$Recycle.bin\\*' - 'C:\Intel\Logs\\*' - 'C:\Users\Default\\*' - 'C:\Users\Public\\*' - 'C:\Users\NetworkService\\*' - 'C:\Windows\Fonts\\*' - 'C:\Windows\Debug\\*' - 'C:\Windows\Media\\*' - 'C:\Windows\Help\\*' - 'C:\Windows\addins\\*' - 'C:\Windows\repair\\*' - 'C:\Windows\security\\*' - '*\RSA\MachineKeys\\*' - 'C:\Windows\system32\config\systemprofile\\*' condition: selection falsepositives: - Unknown level: high