LoFP LoFP / t1204

t1204

TitleTags
3rd party tool may have commandline parameter that can trigger this detection.
a new and unusual program or artifact download in the course of software upgrades, debugging, or troubleshooting could trigger this alert. users downloading and running programs from unusual locations, such as temporary directories, browser caches, or profile paths could trigger this alert.
administrators deploying legitimate binaries to public folders.
all kind of software downloads
all kinds of software downloads
legitimate installation of new application.
legitimate installation of printer driver qms 810, texas instruments microlaser printer (unlikely)
legitimate macro usage. add the appropriate filter according to your environment
need tuning applocker or add exceptions in siem
newly setup system.
operators can execute third party tools using these parameters.
some legitimate processes may be only rarely executed in your environment.
some tuning might be required to allow or remove certain locations used by the rule if you consider them as safe locations
the html help executable program (hh.exe) runs whenever a user clicks a compiled help (.chm) file or menu item that opens the help file inside the help viewer. this is not always malicious, but adversaries may abuse this technology to conceal malicious code.
third party tool may have same command line parameters as revil ransomware.
this rule is to explore new applications on an endpoint. false positives depends on the organization.
unknown flash download locations
unlikely
unlikely in most cases, further investigation should be done in the commandline of the browser process to determine the context of the url accessed.