SigmaHQ/rules/windows/process_creation/win_attrib_hiding_files.yml
2020-06-16 14:46:08 -06:00

34 lines
959 B
YAML

title: Hiding Files with Attrib.exe
id: 4281cb20-2994-4580-aa63-c8b86d019934
status: experimental
description: Detects usage of attrib.exe to hide files from users.
author: Sami Ruohonen
date: 2019/01/16
logsource:
category: process_creation
product: windows
detection:
selection:
Image: '*\attrib.exe'
CommandLine: '* +h *'
ini:
CommandLine: '*\desktop.ini *'
intel:
ParentImage: '*\cmd.exe'
CommandLine: +R +H +S +A \\*.cui
ParentCommandLine: C:\WINDOWS\system32\\*.bat
condition: selection and not (ini or intel)
fields:
- CommandLine
- ParentCommandLine
- User
tags:
- attack.defense_evasion
- attack.persistence
- attack.t1158
- attack.t1564.001
falsepositives:
- igfxCUIService.exe hiding *.cui files via .bat script (attrib.exe a child of cmd.exe and igfxCUIService.exe is the parent of the cmd.exe)
- msiexec.exe hiding desktop.ini
level: low