
Summary
This detection rule monitors for the usage of the rar.exe command-line tool to create compressed archives with password protection or specific compression levels. The rule is particularly designed to identify potentially malicious behavior as these types of operations are common in data exfiltration, particularly associated with Advanced Persistent Threats (APTs). It triggers an alert when a command line input contains both the password option (-hp) and specific compression flags, indicating a suspicious or potentially harmful intent. The rule accounts for false positives arising from legitimate usage scenarios and specifies that it focuses on the Windows platform due to its association with the rar.exe executable.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1560.001
Created: 2020-05-12