Detection rules › Sigma

Suspicious Files in Default GPO Folder

Severity
medium
Author
elhoim
Source
upstream

Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1036.005 Masquerading: Match Legitimate Resource Name or Location

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate

Stages and Predicates

Stage 1: selection

or:
TargetFilename|endswith: .dll
TargetFilename|endswith: .exe
TargetFilename|contains: '\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
TargetFilenameends_with
  • .dll corpus 21 (sigma 21)
  • .exe corpus 18 (sigma 18)
TargetFilenamematch
  • \Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\