SigmaHQ/rules/windows/sysmon/sysmon_susp_execution_path.yml

25 lines
644 B
YAML

title: Execution in Non-Executable Folder
status: experimental
description: Detects a suspicious exection from an uncommon folder
author: Florian Roth
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
Image:
- '*\$Recycle.bin'
- '*\Users\All Users\*'
- '*\Users\Default\*'
- '*\Users\Public\*'
- 'C:\Perflogs\*'
- '*\config\systemprofile\*'
- '*\Windows\Fonts\*'
- '*\Windows\IME\*'
- '*\Windows\addins\*'
condition: selection
falsepositives:
- Unknown
level: high