Suspicious Executable File Creation

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detect creation of suspicious executable file names. Some strings look for suspicious file extensions, others look for filenames that exploit unquoted service paths.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "File Created or Modified" AND FILENAME endswith ":\$Recycle.Bin.exe,:\Documents and Settings.exe,:\MSOCache.exe,:\PerfLogs.exe,:\Recovery.exe,.bat.exe,.sys.exe" OR OBJECTNAME endswith ":\$Recycle.Bin.exe,:\Documents and Settings.exe,:\MSOCache.exe,:\PerfLogs.exe,:\Recovery.exe,.bat.exe,.sys.exe" select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.FILENAME,Action1.PROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113