LoFP LoFP / t1204

t1204

TitleTags
3rd party tool may have commandline parameter that can trigger this detection.
a new and unusual program or artifact download in the course of software upgrades, debugging, or troubleshooting could trigger this alert. users downloading and running programs from unusual locations, such as temporary directories, browser caches, or profile paths could trigger this alert.
a newly installed program or one that runs rarely as part of a monthly or quarterly workflow could trigger this alert.
administrators deploying legitimate binaries to public folders.
all kind of software downloads
all kinds of software downloads
false positives should be very unlikely.
legitimate administrative actions using mmc to execute misnamed `.msc` files.
legitimate applications packaged with advanced installer using package support framework
legitimate applications using runmru with http links
legitimate installation of new application.
legitimate installation of unsigned packages for legitimate purposes such as development or testing
legitimate macro usage. add the appropriate filter according to your environment
legitimate usage of deno to request a file or bring a dll to a host
legitimate use of powershell or other utilities launched from browser extensions or automation tools
newly setup system.
no false positives have been identified at this time.
operators can execute third party tools using these parameters.
rare legitimate usage of some of the extensions mentioned in the rule
some legitimate applications installation which have been missed from filtering can generate fps, thus baselining and tuning is recommended before deploying to production
some legitimate processes may be only rarely executed in your environment. apply additional filters as needed.
some tuning might be required to allow or remove certain locations used by the rule if you consider them as safe locations
system updates, scheduled backups, or misconfigured services may trigger this alert.
the html help executable program (hh.exe) runs whenever a user clicks a compiled help (.chm) file or menu item that opens the help file inside the help viewer. this is not always malicious, but adversaries may abuse this technology to conceal malicious code.
third party tool may have same command line parameters as revil ransomware.
this rule is to explore new applications on an endpoint. false positives depends on the organization.
trusted webdav shares used to host trusted content.
unconventional but non-malicious usage of rlo or reversed extensions.
unknown
unknown flash download locations
unlikely
unlikely in most cases, further investigation should be done in the commandline of the browser process to determine the context of the url accessed.
unlikely, since this event notifies about blocked application execution. tune your applocker rules to avoid blocking legitimate applications.