Detectionmediumtest
Windows Network Access Suspicious desktop.ini Action
Detects unusual processes accessing desktop.ini remotely over network share, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Tim Shelton (HAWK.IO)Created Mon Dec 06Updated Sun Jan 1635bc7e28-ee6b-492f-ab04-da58fcf6402ewindows
Log Source
Windowssecurity
ProductWindows← raw: windows
Servicesecurity← raw: security
Detection Logic
Detection Logic1 selector
detection:
selection:
EventID: 5145
ObjectType: File
RelativeTargetName|endswith: '\desktop.ini'
AccessList|contains:
- 'WriteData'
- 'DELETE'
- 'WriteDAC'
- 'AppendData'
- 'AddSubdirectory'
condition: selectionFalse Positives
Read only access list authority
References
MITRE ATT&CK
Sub-techniques
Rule Metadata
Rule ID
35bc7e28-ee6b-492f-ab04-da58fcf6402e
Status
test
Level
medium
Type
Detection
Created
Mon Dec 06
Modified
Sun Jan 16
Author
Path
rules/windows/builtin/security/win_security_net_share_obj_susp_desktop_ini.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.t1547.009