Windows self extraction directive file created

This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detects creation or access of Self Extraction Directive files that may be used for defense evasion through system binary proxy execution.

Strategy

This rule monitors Windows file access events where @evt.id is 4663 or network share access events where @evt.id is 5145 when the target file @Event.EventData.Data.RelativeTargetName has a .sed extension. Self Extraction Directive files are configuration files used by legitimate utilities like IExpress.exe to create self-extracting archives. Attackers can abuse this functionality to create seemingly legitimate executable files that extract and execute malicious payloads, bypassing security controls that trust signed system binaries or allow-listed applications.

Triage and response

  • Examine the .sed file contents on {{host}} to understand what files will be extracted and which commands will be executed.
  • Review the source process that created or accessed the .sed file to determine if it represents legitimate software packaging versus malicious activity.
  • Check for corresponding IExpress.exe execution or other self-extraction utility usage around the same timeframe.
  • Analyze any resulting executable files created from the self-extraction process for malicious content or suspicious behavior.
  • Verify if the user account has legitimate business need to create self-extracting archives or software packages.