LoFP LoFP / t1204

t1204

TitleTags
3rd party tool may have commandline parameter that can trigger this detection.
a new and unusual program or artifact download in the course of software upgrades, debugging, or troubleshooting could trigger this alert. users downloading and running programs from unusual locations, such as temporary directories, browser caches, or profile paths could trigger this alert.
administrators may allow creation of script or exe in this path.
all kind of software downloads
all kinds of software downloads
it is possible for this search to generate a notable event for a batch file write to a path that includes the string \"system32\", but is not the actual windows system directory. as such, you should confirm the path of the batch file identified by the search. in addition, a false positive may be generated by an administrator copying a legitimate batch file in this directory tree. you should confirm that the activity is legitimate and modify the search to add exclusions, as necessary.
known applications running from these locations for legitimate purposes. targeting only kerberos (port 88) may significantly reduce noise.
legitimate installation of new application.
legitimate installation of printer driver qms 810, texas instruments microlaser printer (unlikely)
legitimate macro usage. add the appropriate filter according to your environment
need tuning applocker or add exceptions in siem
newly setup system.
operators can execute third party tools using these parameters.
single-letter executables are not always malicious. investigate this activity with your normal incident-response process.
some legitimate processes may be only rarely executed in your environment.
some tuning might be required to allow or remove certain locations used by the rule if you consider them as safe locations
the html help executable program (hh.exe) runs whenever a user clicks a compiled help (.chm) file or menu item that opens the help file inside the help viewer. this is not always malicious, but adversaries may abuse this technology to conceal malicious code.
third party tool may have same command line parameters as revil ransomware.
this rule is to explore new applications on an endpoint. false positives depends on the organization.
unknown flash download locations
unlikely
unlikely in most cases, further investigation should be done in the commandline of the browser process to determine the context of the url accessed.
when your development is spreaded in different time zones, applying this rule can be difficult.