title: Data Compressed - rar.exe author: Timur Zinniatullin, E.M. Anhaus, oscd.community date: 2019/10/21 description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network. detection: SELECTION_1: EventID: 1 SELECTION_2: Image: '*\rar.exe' SELECTION_3: CommandLine: '* a *' condition: (SELECTION_1 and SELECTION_2 and SELECTION_3) falsepositives: - Highly likely if rar is a default archiver in the monitored environment. fields: - Image - CommandLine - User - LogonGuid - Hashes - ParentProcessGuid - ParentCommandLine id: 6f3e2987-db24-4c78-a860-b4f4095a7095 level: low logsource: category: process_creation product: windows modified: 2020/08/29 references: - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.md - https://eqllib.readthedocs.io/en/latest/analytics/1ec33c93-3d0b-4a28-8014-dbdaae5c60ae.html status: experimental tags: - attack.exfiltration - attack.t1002 - attack.collection - attack.t1560.001 yml_filename: win_data_compressed_with_rar.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation