LoFP LoFP / t1566.002

t1566.002

TitleTags
false positives are expected from legitimate applications generating events that are similar to those generated by malicious activity. for example, event id 1122 is generated when a process attempts to load a dll that is blocked by an asr rule. this can be triggered by legitimate applications that attempt to load dlls that are not blocked by asr rules. this is block only.
false positives are not expected with this analytic, since it is a hunting analytic. it is meant to show the use of asr rules and how they can be used to detect malicious activity.
in most organizations, device code authentication will be used to access common microsoft service but it may be legitimate for others. filter as needed.
this detection should yield little or no false positive results. it is uncommon for lnk files to be executed from temporary or user directories.