LoFP LoFP / some legitimate system or security tools may run from these folders and create network connections. review and allow trusted processes to reduce false positives.

Techniques

Sample rules

Windows Network Connection From Program In Suspect Location

Description

The following analytic detects network connections from processes running out of suspicious Windows directories such as Recycle Bin, Public, PerfLogs, systemprofile, Fonts, IME, and Addins paths. This activity is significant because malware often executes from writable or unusual directories while communicating with external infrastructure. If confirmed malicious, the process may represent command-and-control, staging, or data exfiltration activity from a compromised endpoint.

Detection logic


| tstats `security_content_summariesonly`
  count min(_time) as firstTime
        max(_time) as lastTime

from datamodel=Network_Traffic.All_Traffic where

All_Traffic.app IN (
    "*\\$Recycle.Bin\\*",
    "*\\Config\\SystemProfile\\*",
    "*\\PerfLogs\\*",
    "*\\Users\\All Users\\*",
    "*\\Users\\Default\\*",
    "*\\Users\\Public\\*",
    "*\\Windows\\addins\\*",
    "*\\Windows\\Fonts\\*",
    "*\\Windows\\IME\\*"
)

by All_Traffic.dest All_Traffic.dest_ip All_Traffic.dest_port All_Traffic.src
   All_Traffic.src_ip All_Traffic.src_port All_Traffic.transport All_Traffic.protocol
   All_Traffic.protocol_version All_Traffic.direction All_Traffic.action All_Traffic.app
   All_Traffic.dvc All_Traffic.user All_Traffic.vendor_product


| `drop_dm_object_name(All_Traffic)`

| `security_content_ctime(firstTime)`

| `security_content_ctime(lastTime)`

| `windows_network_connection_from_program_in_suspect_location_filter`