title: Suspicious Compression Tool Parameters id: 27a72a60-7e5e-47b1-9d17-909c9abafdcd status: experimental description: Detects suspicious command line arguments of common data compression tools references: - https://twitter.com/SBousseaden/status/1184067445612535811 tags: - attack.collection - attack.t1560.001 - attack.exfiltration # an old one - attack.t1020 # an old one - attack.t1002 # an old one author: Florian Roth, Samir Bousseaden date: 2019/10/15 modified: 2020/09/05 logsource: category: process_creation product: windows detection: selection: OriginalFileName: - '7z*.exe' - '*rar.exe' - '*Command*Line*RAR*' CommandLine|contains: - ' -p' - ' -ta' - ' -tb' - ' -sdel' - ' -dw' - ' -hp' falsepositive: ParentImage|startswith: 'C:\Program' condition: selection and not falsepositive falsepositives: - unknown level: high