SigmaHQ/rules/windows/process_creation/win_susp_compression_params.yml

38 lines
1008 B
YAML
Raw Normal View History

title: Suspicious Compression Tool Parameters
2019-11-12 22:12:27 +00:00
id: 27a72a60-7e5e-47b1-9d17-909c9abafdcd
status: experimental
description: Detects suspicious command line arguments of common data compression tools
references:
- https://twitter.com/SBousseaden/status/1184067445612535811
tags:
- attack.collection
- attack.t1560.001
- attack.exfiltration # an old one
- attack.t1020 # an old one
- attack.t1002 # an old one
author: Florian Roth, Samir Bousseaden
date: 2019/10/15
modified: 2020/09/05
logsource:
category: process_creation
product: windows
detection:
selection:
OriginalFileName:
- '7z*.exe'
- '*rar.exe'
- '*Command*Line*RAR*'
CommandLine:
- '* -p*'
- '* -ta*'
- '* -tb*'
- '* -sdel*'
- '* -dw*'
- '* -hp*'
falsepositive:
ParentImage: 'C:\Program*'
condition: selection and not falsepositive
falsepositives:
- unknown
level: high