title: Suspicious desktop.ini Action id: 81315b50-6b60-4d8f-9928-3466e1022515 status: experimental description: Detects unusual processes accessing desktop.ini, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk. references: - https://isc.sans.edu/forums/diary/Desktopini+as+a+postexploitation+tool/25912/ author: Maxime Thiebaut (@0xThiebaut) date: 2020/03/19 modified: 2020/08/23 tags: - attack.persistence - attack.t1023 # an old one - attack.t1547.009 logsource: product: windows category: file_event detection: filter: Image: - 'C:\Windows\explorer.exe' - 'C:\Windows\System32\msiexec.exe' - 'C:\Windows\System32\mmc.exe' selection: TargetFilename|endswith: '\desktop.ini' condition: selection and not filter falsepositives: - Operations performed through Windows SCCM or equivalent level: medium