Skip to content
Threat Feed
high advisory

Windows Binary Execution from Archive-Related Paths

Detects the execution of a binary from archive-related paths within a user's Temp directory, potentially indicating attempts to bypass Mark-of-the-Web (MOTW) or exploit vulnerabilities like CVE-2025-0411.

This detection identifies suspicious execution patterns where Windows binaries are launched from archive-related paths within a user’s temporary directory. This technique is often employed by attackers to circumvent security mechanisms like Mark-of-the-Web (MOTW), as seen in instances such as CVE-2025-0411. The detection focuses on binaries executed by trusted processes like explorer.exe, winrar.exe, and 7zFM.exe. The targeted process paths include the user’s Temp directory and archive markers like RAR, 7z, or ZIP. This behavior allows attackers to execute malicious code without triggering standard security alerts, making it crucial for defenders to monitor for this anomaly.

Attack Chain

  1. A user receives a malicious archive file (e.g., RAR, ZIP, 7z) via phishing or drive-by download.
  2. The user opens the archive using explorer.exe, winrar.exe, or 7zFM.exe.
  3. The archive contains a malicious executable file disguised as a legitimate document or media file.
  4. The executable is extracted to a temporary directory within the user’s AppData\Local\Temp\ folder.
  5. The user clicks on the extracted file, triggering its execution.
  6. Because the file was extracted from an archive and executed from the Temp directory, it might bypass Mark-of-the-Web (MOTW) protections.
  7. The malicious executable performs its intended actions, such as installing malware, establishing persistence, or exfiltrating data.
  8. The attacker gains unauthorized access to the system or network.

Impact

Successful exploitation can lead to the installation of malware, data theft, and complete system compromise. By bypassing MOTW and other security measures, attackers can gain a foothold in the network and move laterally to access sensitive data. The impact can range from individual user compromises to large-scale data breaches, causing significant financial and reputational damage. The exploitation of CVE-2025-0411 and similar vulnerabilities can affect a wide range of users who regularly interact with archive files.

Recommendation

  • Deploy the Sigma rule Binary Executed from Archive-Related Temp Path to your SIEM and tune for your environment to detect the execution of binaries from archive-related paths within the user’s Temp directory.
  • Investigate any alerts generated by the Sigma rule, focusing on the parent process, executed path, and user context.
  • Implement application control policies to restrict the execution of binaries from temporary directories.
  • Educate users about the risks of opening suspicious archive files and clicking on extracted executables.
  • Monitor process execution events (Sysmon EventID 1 or CrowdStrike ProcessRollup2) for unusual parent-child process relationships involving archive extraction tools and executables.

Detection coverage 2

Binary Executed from Archive-Related Temp Path

high

Detects the execution of a binary from archive-related paths within the user's Temp directory.

sigma tactics: execution techniques: T1204.002 sources: process_creation, windows

Suspicious Process Started by WinRAR

medium

Detects processes started by WinRAR that are located in the Temp directory, which is often abused by malware.

sigma tactics: execution techniques: T1204.002 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →