Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This analytic rule detects any executable file creation in uncommon locations like temproray folders. This could be an indication of a persistence or defese evasion attempt by an adversary.
| Attribute | Value |
|---|---|
| Type | Hunting Query |
| Solution | Malware Protection Essentials |
| ID | ab8ddb26-050c-40aa-aaf0-bfb7e3eeb05f |
| Tactics | Persistence, PrivilegeEscalation, DefenseEvasion |
| Techniques | T1037, T1547, T1564 |
| Required Connectors | CrowdStrikeFalconEndpointProtection, MicrosoftThreatProtection, SentinelOne, VMwareCarbonBlack, CiscoSecureEndpoint, TrendMicroApexOne, TrendMicroApexOneAma |
| Source | View on GitHub |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Hunting Queries · Back to Malware Protection Essentials