Detectionhightest
Suspicious Desktopimgdownldr Target File
Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Florian Roth (Nextron Systems)Created Fri Jul 03Updated Thu Jun 02fc4f4817-0c53-4683-a4ee-b17a64bc1039windows
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event
Events for file system activity including creation, modification, and deletion.
Detection Logic
Detection Logic3 selectors
detection:
selection:
Image|endswith: '\svchost.exe'
TargetFilename|contains: '\Personalization\LockScreenImage\'
filter1:
TargetFilename|contains: 'C:\Windows\'
filter2:
TargetFilename|contains:
- '.jpg'
- '.jpeg'
- '.png'
condition: selection and not filter1 and not filter2False Positives
False positives depend on scripts and administrative tools used in the monitored environment
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
fc4f4817-0c53-4683-a4ee-b17a64bc1039
Status
test
Level
high
Type
Detection
Created
Fri Jul 03
Modified
Thu Jun 02
Path
rules/windows/file/file_event/file_event_win_susp_desktopimgdownldr_file.yml
Raw Tags
attack.command-and-controlattack.t1105