Executable Files Created in Uncommon Locations

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This analytic rule detects any executable file creation in uncommon locations like temproray folders. This could be an indication of a persistence or defese evasion attempt by an adversary.

Attribute Value
Type Hunting Query
Solution Malware Protection Essentials
ID ab8ddb26-050c-40aa-aaf0-bfb7e3eeb05f
Tactics Persistence, PrivilegeEscalation, DefenseEvasion
Techniques T1037, T1547, T1564
Required Connectors CrowdStrikeFalconEndpointProtection, MicrosoftThreatProtection, SentinelOne, VMwareCarbonBlack, CiscoSecureEndpoint, TrendMicroApexOne, TrendMicroApexOneAma
Source View on GitHub

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Malware Protection Essentials