Unusual File Deletion by Dns.exe

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects an unexpected file being deleted by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "File deleted" AND PROCESSNAME endswith "\dns.exe" AND (FILENAME notendswith "\dns.log" AND OBJECTNAME notendswith "\dns.log") select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.PROCESSNAME,Action1.ACCESSLIST,Action1.OBJECTNAME,Action1.FILENAME,Action1.FILETYPE

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Tim Rauch (Nextron Systems), Elastic (idea)