SigmaHQ/rules/windows/process_creation/win_susp_mpcmdrun_download.yml
2020-09-04 16:50:57 +02:00

30 lines
836 B
YAML

title: Windows Defender Download Activity
id: 46123129-1024-423e-9fae-43af4a0fa9a5
status: experimental
description: Detect the use of Windows Defender to download payloads
author: Matthew Matchen
date: 2020/09/04
references:
- https://twitter.com/djmtshepana/status/1301608169496612866
- https://lolbas-project.github.io/lolbas/Binaries/MpCmdRun/
tags:
- attack.defense_evasion
- attack.t1218.010
logsource:
category: process_creation
product: windows
detection:
selection1:
- CommandLine|contains: 'MpCmdRun.exe'
- Description: 'Microsoft Malware Protection Command Line Utility'
selection2:
CommandLine|contains|all:
- 'DownloadFile'
- 'url'
condition: selection1 and selection2
fields:
- CommandLine
falsepositives:
- Unknown
level: high