Set Suspicious Files as System Files Using Attrib.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the usage of attrib with the "+s" option to set scripts or executables located in suspicious locations as system files to hide them from users and make them unable to be deleted with simple rights. The rule limits the search to specific extensions and directories to avoid FPs

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND ((PROCESSNAME endswith "\attrib.exe" OR ORIGINALFILENAME = "ATTRIB.EXE") AND COMMANDLINE contains " +s" AND COMMANDLINE contains " %,\Users\Public\,\AppData\Local\,\ProgramData\,\Downloads\,\Windows\Temp" AND COMMANDLINE contains ".bat,.dll,.exe,.hta,.ps1,.vbe,.vbs") AND (COMMANDLINE notcontains "\Windows\TEMP" OR COMMANDLINE notcontains ".exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems)