
Summary
This detection rule focuses on identifying the malicious use of the Windows executable 'IMEWDBLD.exe', which is leveraged to download arbitrary files from the internet. The rule specifies two primary detection methods: one monitors the process creation for instances of 'IMEWDBLD.exe' based on its file name and original file name attributes, and the other inspects command line arguments to find URLs (http or https) indicating an attempt to download files. This strategy is particularly relevant for threat detection as it targets an evolved technique that may be employed in attacks involving file downloads for malicious purposes, thereby contributing to defense evasion and execution tactics outlined in the MITRE ATT&CK framework. The rule is currently in testing and reportedly has a high severity level due to the potential security risks posed by arbitrary file downloads.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1105
Created: 2023-11-09