Files
blue-team-tools/rules/windows/process_creation/win_susp_execution_path.yml
T
2020-11-28 13:07:22 +01:00

33 lines
832 B
YAML

title: Execution in Non-Executable Folder
id: 3dfd06d2-eaf4-4532-9555-68aca59f57c4
status: experimental
description: Detects a suspicious exection from an uncommon folder
author: Florian Roth
date: 2019/01/16
modified: 2020/11/28
tags:
- attack.defense_evasion
- attack.t1036
logsource:
category: process_creation
product: windows
detection:
selection:
- Image|contains:
- '\Users\All Users\'
- '\Users\Default\'
- '\Users\Public\'
- '\config\systemprofile\'
- '\Windows\Fonts\'
- '\Windows\IME\'
- '\Windows\addins\'
- Image|endswith: '\$Recycle.bin'
- Image|startswith: 'C:\Perflogs\'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: high