Legitimate Application Writing Files In Uncommon Location
Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution. Adversaries may leverage legitimate applications (Living off the Land Binaries - LOLBins) to drop or download malicious files to uncommon locations on the system to evade detection by security solutions.
Sigma rule (View on GitHub)
1title: Legitimate Application Writing Files In Uncommon Location
2id: 1cf465a1-2609-4c15-9b66-c32dbe4bfd67
3related:
4 - id: 2ddef153-167b-4e89-86b6-757a9e65dcac # bitsadmin dedicated rule
5 type: similar
6status: experimental
7description: |
8 Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution.
9 Adversaries may leverage legitimate applications (Living off the Land Binaries - LOLBins) to drop or download malicious files to uncommon locations on the system to evade detection by security solutions.
10references:
11 - https://lolbas-project.github.io/#/download
12author: Swachchhanda Shrawan Poudel (Nextron Systems)
13date: 2025-12-10
14tags:
15 - attack.defense-evasion
16 - attack.t1218
17 - attack.command-and-control
18 - attack.t1105
19logsource:
20 product: windows
21 category: file_event
22detection:
23 selection_img:
24 Image|endswith:
25 # Microsoft Office Programs Dropping Executables / Rest of the apps are covered in: c7a74c80-ba5a-486e-9974-ab9e682bc5e4
26 - '\eqnedt32.exe'
27 - '\wordpad.exe'
28 - '\wordview.exe'
29 # LOLBINs that can be used to download executables
30 - '\cmdl32.exe'
31 - '\certutil.exe'
32 - '\certoc.exe'
33 - '\CertReq.exe'
34 - '\bitsadmin.exe'
35 - '\Desktopimgdownldr.exe'
36 - '\esentutl.exe'
37 - '\expand.exe'
38 - '\extrac32.exe'
39 - '\replace.exe'
40 - '\mshta.exe'
41 - '\ftp.exe'
42 - '\Ldifde.exe'
43 - '\RdrCEF.exe'
44 - '\hh.exe'
45 - '\finger.exe'
46 - '\findstr.exe'
47 selection_locations:
48 TargetFilename|contains:
49 - ':\Perflogs'
50 - ':\ProgramData\'
51 - ':\Temp\'
52 - ':\Users\Public\'
53 - ':\Windows\'
54 - '\$Recycle.Bin\'
55 - '\AppData\Local\'
56 - '\AppData\Roaming\'
57 - '\Contacts\'
58 - '\Desktop\'
59 - '\Favorites\'
60 - '\Favourites\'
61 - '\inetpub\wwwroot\'
62 - '\Music\'
63 - '\Pictures\'
64 - '\Start Menu\Programs\Startup\'
65 - '\Users\Default\'
66 - '\Videos\'
67 condition: all of selection_*
68falsepositives:
69 - Unknown
70level: high
71regression_tests_path: regression_data/rules/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_in_uncommon_location/info.yml
References
Related rules
- Potential Exploitation of RCE Vulnerability CVE-2025-33053
- Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Image Load
- Potential Exploitation of RCE Vulnerability CVE-2025-33053 - Process Access
- Potential Pikabot Infection - Suspicious Command Combinations Via Cmd.EXE
- Scheduled Task Creation with Curl and PowerShell Execution Combo