Suspicious Response File Execution Via Odbcconf.EXE

Rule Info

Name
Suspicious Response File Execution Via Odbcconf.EXE
Author
Nasreddine Bencherchali (Nextron Systems)
Description
Detects execution of "odbcconf" with the "-f" flag in order to load a response file with a non-".rsp" extension.
Date
2023-05-22 00:00:00
Modified
2024-03-13 00:00:00
Id
2d32dd6f-3196-4093-b9eb-1ad8ab088ca5
Tags
attack.defense_evasion attack.t1218.008 DEMO
Type
Community Rule

Rule History

Author
Title
Date
Commit
frack113
Merge PR #4767 from @frack113 - Update additional rules to use the `windash` modifier
2024-03-15
Nasreddine Bencherchali
feat: rule and tests update
2023-05-31
cyb3rjy0t
feat: add/update rules related to odbcconf (#4228)
2023-05-23