← Back to SOC feed Coverage →

Suspicious Desktopimgdownldr Target File

sigma HIGH SigmaHQ
T1105
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may use the desktopimgdownldr tool to exfiltrate data or execute malicious payloads by creating suspicious files in unexpected locations or with malicious extensions. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential command and control or data exfiltration activities early.

Detection Rule

Sigma (Original)

title: Suspicious Desktopimgdownldr Target File
id: fc4f4817-0c53-4683-a4ee-b17a64bc1039
status: test
description: Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension
references:
    - https://labs.sentinelone.com/living-off-windows-land-a-new-native-file-downldr/
    - https://twitter.com/SBousseaden/status/1278977301745741825
author: Florian Roth (Nextron Systems)
date: 2020-07-03
modified: 2022-06-02
tags:
    - attack.command-and-control
    - attack.t1105
logsource:
    product: windows
    category: file_event
detection:
    selection:
        Image|endswith: '\svchost.exe'
        TargetFilename|contains: '\Personalization\LockScreenImage\'
    filter1:
        TargetFilename|contains: 'C:\Windows\'
    filter2:
        TargetFilename|contains:
            - '.jpg'
            - '.jpeg'
            - '.png'
    condition: selection and not filter1 and not filter2
falsepositives:
    - False positives depend on scripts and administrative tools used in the monitored environment
level: high

KQL (Azure Sentinel)

imFileEvent
| where (TargetFilePath endswith "\\svchost.exe" and TargetFileName contains "\\Personalization\\LockScreenImage\\") and (not(TargetFileName contains "C:\\Windows\\")) and (not((TargetFileName contains ".jpg" or TargetFileName contains ".jpeg" or TargetFileName contains ".png")))

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_susp_desktopimgdownldr_file.yml