33 lines
1.0 KiB
YAML
33 lines
1.0 KiB
YAML
title: Files Dropped to Program Files by Non-Priviledged Process
|
|
id: d6d9f4fb-4c1c-4f53-b306-62a22c7c61e1
|
|
description: Search for dropping of files to Windows/Program Files fodlers by non-priviledged processes
|
|
status: experimental
|
|
author: Teymur Kheirkhabarov (idea), Ryan Plas (rule), oscd.community
|
|
date: 2020/10/17
|
|
modified: 2021/08/14
|
|
references:
|
|
- https://image.slidesharecdn.com/kheirkhabarovoffzonefinal-181117201458/95/hunting-for-privilege-escalation-in-windows-environment-37-638.jpg
|
|
tags:
|
|
- attack.persistence
|
|
- attack.defense_evasion
|
|
- attack.t1574
|
|
- attack.t1574.010
|
|
logsource:
|
|
category: file_event
|
|
product: windows
|
|
detection:
|
|
integrity:
|
|
IntegrityLevel: 'Medium'
|
|
program_files:
|
|
TargetFilename|contains:
|
|
- '\Program Files\'
|
|
- '\Program Files (x86)\'
|
|
windows:
|
|
TargetFilename|startswith: '\Windows\'
|
|
temp:
|
|
TargetFilename|contains: 'temp'
|
|
condition: integrity and (program_files or windows and not temp)
|
|
falsepositives:
|
|
- Unknown
|
|
level: medium
|