EXPLORE
← Back to Explore
sigmamediumHunting

Suspicious Files in Default GPO Folder

Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder

MITRE ATT&CK

defense-evasion

Detection Query

selection:
  TargetFilename|contains: \Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\
  TargetFilename|endswith:
    - .dll
    - .exe
condition: selection

Author

elhoim

Created

2022-04-28

Data Sources

windowsFile Events

Platforms

windows

Tags

attack.t1036.005attack.defense-evasion
Raw Content
title: Suspicious Files in Default GPO Folder
id: 5f87308a-0a5b-4623-ae15-d8fa1809bc60
status: test
description: Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder
references:
    - https://redcanary.com/blog/intelligence-insights-november-2021/
author: elhoim
date: 2022-04-28
tags:
    - attack.t1036.005
    - attack.defense-evasion
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|contains: '\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\'
        TargetFilename|endswith:
            - '.dll'
            - '.exe'
    condition: selection
falsepositives:
    - Unknown
level: medium