| Title | Execution in Non-Executable Folder |
|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
| Description | Detects a suspicious exection from an uncommon folder |
| ATT&CK Tactic |
|
| ATT&CK Technique | |
| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
| Trigger | There is no Trigger for this technique yet. |
| Severity Level | high |
| False Positives | |
| Development Status | experimental |
| References | |
| Author | Florian Roth |
## Detection Rules
### Sigma rule
```
title: Execution in Non-Executable Folder
status: experimental
description: Detects a suspicious exection from an uncommon folder
author: Florian Roth
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
Image:
- '*\$Recycle.bin'
- '*\Users\All Users\*'
- '*\Users\Default\*'
- '*\Users\Public\*'
- 'C:\Perflogs\*'
- '*\config\systemprofile\*'
- '*\Windows\Fonts\*'
- '*\Windows\IME\*'
- '*\Windows\addins\*'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: high
```
### Kibana query
```
(EventID:"1" AND Image.keyword:(*\\\\$Recycle.bin *\\\\Users\\\\All\\ Users\\* *\\\\Users\\\\Default\\* *\\\\Users\\\\Public\\* C\\:\\\\Perflogs\\* *\\\\config\\\\systemprofile\\* *\\\\Windows\\\\Fonts\\* *\\\\Windows\\\\IME\\* *\\\\Windows\\\\addins\\*))
```
### X-Pack Watcher
```
curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_xpack/watcher/watch/Execution-in-Non-Executable-Folder <