Explore the full potential of OpenCTI Enterprise Edition, start your 30 days free trial.Learn more
XTM Hub by FiligranSign In

Suspicious File Access Patterns

Technical

Overview

Suspicious File Access Patterns Assesment

🎯 Scenario Objective

The objective of this scenario is to simulate abnormal and potentially malicious file access behavior in order to validate the ability of security controls (EDR, SIEM, UEBA, DLP) to:

Detect unusual volume, frequency, or sequence of file access

Identify non-standard processes accessing sensitive files

Correlate file access activity with user, process, and context

Detect early-stage attacker behaviors such as data discovery, collection, or staging

This scenario focuses on behavioral patterns, not on malware execution.

🧠 Threat Context

Adversaries commonly access large numbers of files after gaining initial access in order to:

Discover sensitive information (documents, credentials, configs)

Prepare for data exfiltration

Perform ransomware impact analysis

Identify intellectual property or financial data

Such activity often results in file access patterns that differ significantly from normal user behavior. 🧪 Scenario Description (Execution Flow) Step 1 – File System Discovery

A process enumerates directories and files across multiple locations (user profile, shared folders, system paths) using automated techniques.

Step 2 – Sensitive File Access

Multiple files of interest (documents, PDFs, archives, configuration files) are opened or read in a short time window.

Step 3 – Unusual Process Context

File access is performed by non-standard or suspicious processes, such as scripting engines, command-line tools, or renamed binaries executed from unusual locations.

Step 4 – Bulk or Automated Access

File access occurs in loops or scripted sequences, generating a high volume of file I/O operations in a limited timeframe.

🧪 Atomic Red Team Dependency

This scenario is implemented using payloads from the Atomic Red Team framework, which provides controlled and repeatable adversary technique simulations mapped to MITRE ATT&CK.

As a result:

The Atomic Red Team collector must be deployed and enabled in OpenAEV

The collector is required to:

Execute Atomic Red Team payloads

Capture execution context and results

Feed OpenAEV with accurate test telemetry and status

Without the Atomic Red Team collector, this scenario cannot be executed or validated correctly.

📊 Expected Telemetry & Logs

EDR

File open/read events

Process-to-file interaction telemetry

Windows Security Logs

Object access events (e.g., 4663, when enabled)

Sysmon

Event ID 11 (FileCreate)

Correlated process execution events

UEBA

Detection of deviations from normal user behavior

🚨 Detection Expectations

Security controls should detect:

Automated or bulk file access behavior

Unusual processes accessing user or sensitive files

File access activity inconsistent with historical user baselines

Correlated suspicious activity across discovery and collection phases

🧪 BAS / AEV Validation Goals Control Validation Focus EDR Behavioral file access detection SIEM Cross-source correlation and alerting UEBA User and process anomaly detection DLP Visibility into sensitive file access 🧹 Cleanup & Safety

No data modification or exfiltration

No destructive actions

Temporary artifacts created by Atomic Red Team payloads are removed after execution

🟢 Outcome

A successful execution confirms that the organization can detect and respond to early-stage suspicious file access activity before escalation to data theft, ransomware deployment, or insider threat actions.

Basic information

Filigran
Sébastien Miguel
January 16, 2026
2.0.11
0
1
    Suspicious File Access Patterns | OpenAEV Scenarios Library | XTM Hub by Filigran