Files
hayabusa/rules/sigma/process_creation/win_susp_rar_flags.yml
DustInDark 0cfa806baf Feature/addruletype to sigma rule#230 (#235)
* added ruletype to SIGMA rule #230

* added ruletype to SIGMA rule converter tool #231
2021-11-28 18:14:51 +09:00

39 lines
1.1 KiB
YAML

title: Rar with Password or Compression Level
author: '@ROxPinTeddy'
date: 2020/05/12
description: Detects the use of rar.exe, on the command line, to create an archive
with password protection or with a specific compression level. This is pretty indicative
of malicious actions.
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
CommandLine:
- '* -hp*'
SELECTION_3:
CommandLine:
- '* -m*'
- '* a *'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3)
falsepositives:
- Legitimate use of Winrar command line version
- Other command line tools, that use these flags
id: faa48cae-6b25-4f00-a094-08947fef582f
level: medium
logsource:
category: process_creation
product: windows
modified: 2021/07/27
references:
- https://labs.sentinelone.com/the-anatomy-of-an-apt-attack-and-cobaltstrike-beacons-encoded-configuration/
- https://ss64.com/bash/rar.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.md
status: experimental
tags:
- attack.collection
- attack.t1560.001
- attack.exfiltration
- attack.t1002
ruletype: SIGMA