title: System File Execution Location Anomaly status: experimental description: Detects a Windows program executable started in a suspicious folder references: - https://twitter.com/GelosSnake/status/934900723426439170 author: Florian Roth, Patrick Bareiss date: 2017/11/27 tags: - attack.defense_evasion - attack.t1036 logsource: category: process_creation product: windows detection: selection: Image: - '*\svchost.exe' - '*\rundll32.exe' - '*\services.exe' - '*\powershell.exe' - '*\regsvr32.exe' - '*\spoolsv.exe' - '*\lsass.exe' - '*\smss.exe' - '*\csrss.exe' - '*\conhost.exe' - '*\wininit.exe' - '*\lsm.exe' - '*\winlogon.exe' - '*\explorer.exe' - '*\taskhost.exe' filter: Image: - 'C:\Windows\System32\\*' - 'C:\Windows\SysWow64\\*' - 'C:\Windows\explorer.exe' - 'C:\Windows\winsxs\*' condition: selection and not filter falsepositives: - Exotic software level: high