SigmaHQ/rules/windows/process_creation/win_susp_compression_params.yml
2019-10-15 16:38:53 +02:00

34 lines
860 B
YAML

title: Suspicious Compression Tool Parameters
status: experimental
description: Detects suspicious command line arguments of common data compression tools
references:
- https://twitter.com/SBousseaden/status/1184067445612535811
tags:
- attack.exfiltration
- attack.t1020
- attack.t1002
author: Florian Roth, Samir Bousseaden
date: 2019/10/15
logsource:
category: process_creation
product: windows
detection:
selection:
OriginalFileName:
- '7z*.exe'
- '*rar.exe'
- '*Command*Line*RAR*'
CommandLine:
- '* -p*'
- '* -ta*'
- '* -tb*'
- '* -sdel*'
- '* -dw*'
- '* -hp*'
falsepositive:
ParentImage: 'C:\Program*'
condition: selection and not falsepositive
falsepositives:
- unknown
level: high