Rules Contributing to Windows Network Access Suspicious desktop.ini Action Alert
The following rules detect suspicious SMB traffic accessing desktop.ini files. Any one or more of these will trigger the Windows Network Access Suspicious desktop.ini Action Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Windows Network Access Suspicious desktop.ini Action |
Detects unusual processes accessing desktop.ini remotely over network share, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk. More details
Rule IDQuery{'selection': {'appid_name': 'smb', 'metadata|contains': ['desktop.ini']}, 'condition': 'selection'} Log SourceStellar Cyber Network Events configured for:
Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
Additional Information
|