Windows Network Access Suspicious desktop.ini Action
Detects unusual processes accessing desktop.ini remotely over network share, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.
Sigma rule (View on GitHub)
1title: Windows Network Access Suspicious desktop.ini Action
2id: 35bc7e28-ee6b-492f-ab04-da58fcf6402e
3status: test
4description: Detects unusual processes accessing desktop.ini remotely over network share, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.
5references:
6 - https://isc.sans.edu/forums/diary/Desktopini+as+a+postexploitation+tool/25912/
7author: Tim Shelton (HAWK.IO)
8date: 2021-12-06
9modified: 2022-01-16
10tags:
11 - attack.persistence
12 - attack.t1547.009
13logsource:
14 product: windows
15 service: security
16detection:
17 selection:
18 EventID: 5145
19 ObjectType: File
20 RelativeTargetName|endswith: '\desktop.ini'
21 AccessList|contains:
22 - 'WriteData'
23 - 'DELETE'
24 - 'WriteDAC'
25 - 'AppendData'
26 - 'AddSubdirectory'
27 condition: selection
28falsepositives:
29 - Read only access list authority
30level: medium
References
Related rules
- Creation Exe for Service with Unquoted Path
- New Custom Shim Database Created
- Suspicious desktop.ini Action
- A Member Was Added to a Security-Enabled Global Group
- A Member Was Removed From a Security-Enabled Global Group