
Summary
This detection rule monitors for the execution of curl.exe with a specific focus on the use of the "file:///" protocol. The rule is designed to catch attempts to read local files using the curl command-line tool, which can be leveraged by attackers to exfiltrate or read sensitive data from the file system. By checking both the process creation events associated with curl.exe and the command line arguments for the presence of "file:///", the rule effectively alerts on suspicious activity that could indicate unauthorized access to local file resources. This is particularly relevant in environments where sensitive data is stored locally, and curl.exe is not typically used for legitimate purposes. The rule is categorized under medium severity, indicating a moderate risk inherent to this behavior, and it is aimed at Windows platforms given the log source configuration. The rule's output is intended for security monitoring tools that support Sigma rules, enhancing the detection capabilities against potential file access vulnerabilities.
Categories
- Windows
Data Sources
- Process
Created: 2023-07-27