EXPLORE
← Back to Explore
T1222

File and Directory Permissions Modification

Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which acti...

ESXiLinuxmacOSWindows
22
Detections
3
Sources
0
Threat Actors

BY SOURCE

14elastic6splunk_escu2sigma

PROCEDURES (15)

General Monitoring4 detections

Auto-extracted: 4 detections for general monitoring

Powershell2 detections

Auto-extracted: 2 detections for powershell

Azure2 detections

Auto-extracted: 2 detections for azure

Persist2 detections

Auto-extracted: 2 detections for persist

Persist2 detections

Auto-extracted: 2 detections for persist

Persist1 detections

Auto-extracted: 1 detections for persist

Command Line Monitoring1 detections

Auto-extracted: 1 detections for command line monitoring

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Container1 detections

Auto-extracted: 1 detections for container

Authentication Monitoring1 detections

Auto-extracted: 1 detections for authentication monitoring

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

Container1 detections

Auto-extracted: 1 detections for container

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

Cloud Monitoring1 detections

Auto-extracted: 1 detections for cloud monitoring

Exfiltrat1 detections

Auto-extracted: 1 detections for exfiltrat

DETECTIONS (22)