Detectionhighexperimental
WinRAR Creating Files in Startup Locations
Detects WinRAR creating files in Windows startup locations, which may indicate an attempt to establish persistence by adding malicious files to the Startup folder. This kind of behaviour has been associated with exploitation of WinRAR path traversal vulnerability CVE-2025-6218 or CVE-2025-8088.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Swachchhanda Shrawan Poudel (Nextron Systems)Created Wed Jul 1674a2b37d-fea4-41e0-9ac7-c9fbcf1f60ccwindows
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event
Events for file system activity including creation, modification, and deletion.
Detection Logic
Detection Logic1 selector
detection:
selection:
Image|endswith:
- '\WinRAR.exe'
- '\Rar.exe'
TargetFilename|contains: '\Start Menu\Programs\Startup\'
condition: selectionFalse Positives
Unknown
False positive likelihood has not been assessed. Additional context may be needed during triage.
MITRE ATT&CK
Rule Metadata
Rule ID
74a2b37d-fea4-41e0-9ac7-c9fbcf1f60cc
Status
experimental
Level
high
Type
Detection
Created
Wed Jul 16
Path
rules/windows/file/file_event/file_event_win_winrar_file_creation_in_startup_folder.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.t1547.001