
Summary
The rule titled 'Renamed CURL.EXE Execution' is designed to detect the execution of a potentially malicious executable that has been renamed from its original filename, 'curl.exe'. The detection logic utilizes the Portable Executable (PE) metadata fields to identify instances where the curl binary, often used in legitimate networking tasks, has been manipulated for obfuscation. This specific approach aims to detect variations of curl that may be exploited for nefarious purposes, such as adversarial command execution, through renamed files that maintain similar attributes to the original executable. The detection is implemented in the context of process creation events on Windows, making it suitable for threat hunting in environments where Windows-based systems are operated. Sources of false positives are acknowledged as 'Unknown', and the detection logic ensures that it triggers on executions with the original filename or specific descriptors while filtering out cases that are not relevant to the threat context. The rule reflects a moderate severity level due to the nature of the threat involved. This rule provides effective coverage against a specific tactic within the MITRE ATT&CK framework related to execution and defense evasion, particularly addressing the technique T1059 (Command and Scripting Interpreter).
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2023-09-11