| Title | Execution in Non-Executable Folder | |:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------| | Description | Detects a suspicious exection from an uncommon folder | | ATT&CK Tactic | | | ATT&CK Technique | | | Data Needed | | | Trigger | There is no Trigger for this technique yet. | | Severity Level | high | | False Positives | | | Development Status | experimental | | References | | | Author | Florian Roth | ## Detection Rules ### Sigma rule ``` title: Execution in Non-Executable Folder status: experimental description: Detects a suspicious exection from an uncommon folder author: Florian Roth logsource: product: windows service: sysmon detection: selection: EventID: 1 Image: - '*\$Recycle.bin' - '*\Users\All Users\*' - '*\Users\Default\*' - '*\Users\Public\*' - 'C:\Perflogs\*' - '*\config\systemprofile\*' - '*\Windows\Fonts\*' - '*\Windows\IME\*' - '*\Windows\addins\*' condition: selection fields: - CommandLine - ParentCommandLine falsepositives: - Unknown level: high ``` ### Kibana query ``` (EventID:"1" AND Image.keyword:(*\\\\$Recycle.bin *\\\\Users\\\\All\\ Users\\* *\\\\Users\\\\Default\\* *\\\\Users\\\\Public\\* C\\:\\\\Perflogs\\* *\\\\config\\\\systemprofile\\* *\\\\Windows\\\\Fonts\\* *\\\\Windows\\\\IME\\* *\\\\Windows\\\\addins\\*)) ``` ### X-Pack Watcher ``` curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_xpack/watcher/watch/Execution-in-Non-Executable-Folder <