- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects password-protected ZIP files containing suspicious filenames that are commonly used in phishing attacks.
This rule monitors Windows event ID 5379
for shell extension handler operations involving ZIP folders with common social engineering keywords. It identifies when @Event.EventData.Data.TargetName
contains Microsoft_Windows_Shell_ZipFolder
along with suspicious terms.
Password-protected archives prevent security scanning while business-themed filenames create urgency for users to open the contents. These techniques combined are frequently used in malware distribution campaigns to bypass detection controls.
{{host}}
and how it was delivered.{{host}}
if compromise indicators are detected.