Set Files as System Files Using Attrib.EXE
Detects the execution of "attrib" with the "+s" flag to mark files as system files
Sigma rule (View on GitHub)
1title: Set Files as System Files Using Attrib.EXE
2id: bb19e94c-59ae-4c15-8c12-c563d23fe52b
3related:
4 - id: efec536f-72e8-4656-8960-5e85d091345b
5 type: similar
6status: test
7description: Detects the execution of "attrib" with the "+s" flag to mark files as system files
8references:
9 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.001/T1564.001.md#atomic-test-3---create-windows-system-file-with-attrib
10 - https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/attrib
11 - https://unit42.paloaltonetworks.com/unit42-sure-ill-take-new-combojack-malware-alters-clipboards-steal-cryptocurrency/
12author: frack113
13date: 2022/02/04
14modified: 2023/03/14
15tags:
16 - attack.defense_evasion
17 - attack.t1564.001
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection_img:
23 - Image|endswith: '\attrib.exe'
24 - OriginalFileName: 'ATTRIB.EXE'
25 selection_cli:
26 CommandLine|contains: ' +s '
27 condition: all of selection_*
28falsepositives:
29 - Unknown
30level: low
References
Related rules
- Set Suspicious Files as System Files Using Attrib.EXE
- Use Icacls to Hide File to Everyone
- PowerShell Logging Disabled Via Registry Key Tampering
- Hiding Files with Attrib.exe
- Hidden Files and Directories