We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 67844be commit 51ae906Copy full SHA for 51ae906
detections/deprecated/suspicious_process_file_path.yml
@@ -1,10 +1,10 @@
1
name: Suspicious Process File Path
2
id: 9be25988-ad82-11eb-a14f-acde48001122
3
-version: 6
4
-date: '2024-12-10'
+version: 7
+date: '2025-02-10'
5
author: Teoderick Contreras, Splunk
6
status: deprecated
7
-type:
+type: TTP
8
description: The following analytic identifies processes running from file paths not
9
typically associated with legitimate software. It leverages data from Endpoint Detection
10
and Response (EDR) agents, focusing on specific process paths within the Endpoint
0 commit comments