Files
hayabusa/rules/Sigma/win_susp_rar_flags.yml
2021-11-14 11:00:56 +09:00

39 lines
1.2 KiB
YAML

title: Rar with Password or Compression Level
author: '@ROxPinTeddy'
date: 2020/05/12
description: Detects the use of rar.exe, on the command line, to create an archive
with password protection or with a specific compression level. This is pretty
indicative of malicious actions.
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
CommandLine: '* -hp*'
SELECTION_3:
CommandLine: '* -m*'
SELECTION_4:
CommandLine: '* a *'
condition: (SELECTION_1 and (SELECTION_2) and (SELECTION_3 or SELECTION_4))
falsepositives:
- Legitimate use of Winrar command line version
- Other command line tools, that use these flags
id: faa48cae-6b25-4f00-a094-08947fef582f
level: medium
logsource:
category: process_creation
product: windows
modified: 2021/07/27
references:
- https://labs.sentinelone.com/the-anatomy-of-an-apt-attack-and-cobaltstrike-beacons-encoded-configuration/
- https://ss64.com/bash/rar.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.md
status: experimental
tags:
- attack.collection
- attack.t1560.001
- attack.exfiltration
- attack.t1002
yml_filename: win_susp_rar_flags.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation