EXPLORE
← Back to Explore
sigmamediumHunting

Winscp Execution From Non Standard Folder

Detects the execution of Winscp from an a non standard folder. This could indicate the execution of Winscp portable.

MITRE ATT&CK

exfiltration

Detection Query

selection:
  - Image|endswith: \WinSCP.exe
  - OriginalFileName: winscp.exe
filter_main_location:
  Image|startswith: C:\Program Files (x86)\WinSCP\
condition: selection and not 1 of filter_main_*

Author

frack113

Created

2025-10-12

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.exfiltrationattack.t1048detection.threat-hunting
Raw Content
title: Winscp Execution From Non Standard Folder
id: 7674f8ef-7141-4cf0-a311-ee359264c64c
status: experimental
description: Detects the execution of Winscp from an a non standard folder. This could indicate the execution of Winscp portable.
references:
    - https://blogs.blackberry.com/en/2024/07/akira-ransomware-targets-the-latam-airline-industry
author: frack113
date: 2025-10-12
tags:
    - attack.exfiltration
    - attack.t1048
    - detection.threat-hunting
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        - Image|endswith: '\WinSCP.exe'
        - OriginalFileName: 'winscp.exe'
    filter_main_location:
        Image|startswith: 'C:\Program Files (x86)\WinSCP\'
    condition: selection and not 1 of filter_main_*
falsepositives:
    - Unknown
level: medium