2019-12-09 16:24:10 +00:00
title : Data Compressed - rar.exe
2019-11-12 22:12:27 +00:00
id : 6f3e2987-db24-4c78-a860-b4f4095a7095
2019-11-12 22:05:36 +00:00
status : experimental
2021-07-06 09:21:22 +00:00
description : An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.
2019-11-19 01:11:19 +00:00
author : Timur Zinniatullin, E.M. Anhaus, oscd.community
2019-11-12 22:05:36 +00:00
date : 2019 /10/21
2020-08-29 04:39:30 +00:00
modified : 2020 /08/29
2019-11-12 22:05:36 +00:00
references :
2021-07-06 09:21:22 +00:00
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.md
2019-11-19 01:11:19 +00:00
- https://eqllib.readthedocs.io/en/latest/analytics/1ec33c93-3d0b-4a28-8014-dbdaae5c60ae.html
2019-11-12 22:05:36 +00:00
logsource :
category : process_creation
product : windows
detection :
selection :
Image|endswith : '\rar.exe'
2019-11-19 01:11:19 +00:00
CommandLine|contains : ' a '
2019-11-12 22:05:36 +00:00
condition : selection
fields :
- Image
- CommandLine
- User
- LogonGuid
- Hashes
- ParentProcessGuid
- ParentCommandLine
falsepositives :
2021-07-06 09:21:22 +00:00
- Highly likely if rar is a default archiver in the monitored environment.
2019-11-12 22:05:36 +00:00
level : low
tags :
2020-08-29 04:39:30 +00:00
- attack.exfiltration # an old one
- attack.t1002 # an old one
- attack.collection
- attack.t1560.001