heroui logo

Zip A Folder With PowerShell For Staging In Temp - PowerShell

Sigma Rules

View Source
Summary
This detection rule captures potentially malicious activity using PowerShell by monitoring commands that utilize the 'Compress-Archive' cmdlet. The intent behind such compressed archives can often be linked to data exfiltration efforts by adversaries aiming to package sensitive information, such as documents, to facilitate their transfer over the network. The rule specifically looks for instances where the output of the Compress-Archive command is configured to be stored in suspicious locations commonly exploited by malware, particularly within Windows' temporary directories or the user's AppData folder. By flagging these actions, the rule aims to help cybersecurity analysts identify and respond to attempts at illicit data aggregation and transfer.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Command
  • Logon Session
ATT&CK Techniques
  • T1074.001
Created: 2021-07-20