Set Suspicious Files as System Files Using Attrib.EXE
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects the usage of attrib with the "+s" option to set scripts or executables located in suspicious locations as system files to hide them from users and make them unable to be deleted with simple rights. The rule limits the search to specific extensions and directories to avoid FPs
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Process started" AND ((PROCESSNAME endswith "\attrib.exe" OR ORIGINALFILENAME = "ATTRIB.EXE") AND COMMANDLINE contains " +s" AND COMMANDLINE contains " %,\Users\Public\,\AppData\Local\,\ProgramData\,\Downloads\,\Windows\Temp" AND COMMANDLINE contains ".bat,.dll,.exe,.hta,.ps1,.vbe,.vbs") AND (COMMANDLINE notcontains "\Windows\TEMP" OR COMMANDLINE notcontains ".exe") select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Nasreddine Bencherchali (Nextron Systems)


