LoFP LoFP / read only access list authority

Techniques

Sample rules

Suspicious desktop.ini Action

Description

Detects unusual processes accessing desktop.ini, which can be leveraged to alter how Explorer displays a folder’s content (i.e. renaming files) without changing them on disk.

Detection logic

condition: selection and not 1 of filter_*
filter_generic:
  Image|startswith:
  - C:\Windows\
  - C:\Program Files\
  - C:\Program Files (x86)\
filter_jetbrains:
  Image|endswith: \AppData\Local\JetBrains\Toolbox\bin\7z.exe
  TargetFilename|contains: \JetBrains\apps\
filter_upgrade:
  TargetFilename|startswith: C:\$WINDOWS.~BT\NewOS\
selection:
  TargetFilename|endswith: \desktop.ini

Windows Network Access Suspicious desktop.ini Action

Description

Detects unusual processes accessing desktop.ini remotely over network share, which can be leveraged to alter how Explorer displays a folder’s content (i.e. renaming files) without changing them on disk.

Detection logic

condition: selection
selection:
  AccessList|contains:
  - WriteData
  - DELETE
  - WriteDAC
  - AppendData
  - AddSubdirectory
  EventID: 5145
  ObjectType: File
  RelativeTargetName|endswith: \desktop.ini