Skip to content

[Rule Tuning] Unusual File Creation - Alternate Data Stream - WinMerge #4764

Open
@richlv

Description

@richlv

Link to Rule

https://github.com/elastic/detection-rules/blob/main/rules/windows/defense_evasion_unusual_ads_file_creation.toml

Rule Tuning Type

False Positives - Reducing benign events mistakenly identified as threats.

Description

WinMerge is detected as using ADS: <file>:sec.endpointdlp:$DATA.
As it's signed, it might be worth excluding it from the rule.

process.code_signature.exists true
process.code_signature.status trusted
process.code_signature.subject_name Takashi Sawanaka
process.code_signature.trusted true
process.executable C:\Program Files\WinMerge\WinMergeU.exe

Example Data

No response

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions