heroui logo

Suspicious File Downloaded from Google Drive

Elastic Detection Rules

View Source
Summary
This detection rule targets suspicious file download activities originating from Google Drive URLs, which may suggest an attempt to deliver malware or phishing payloads through a trusted cloud storage service. It employs the EQL querying language, focusing on common browser executable processes that execute commands indicating a download from Google Drive while bypassing antivirus checks, specifically those involving parameters like 'export=download' and 'confirm=no_antivirus'. By identifying these patterns, the rule aims to alert security teams to potential malicious actions masquerading as legitimate file downloads. The rule includes a robust analysis guide for investigating such incidents, detailing steps for reviewing processes, user behaviors, and network activities, along with suggestions for managing false positives stemming from normal business operations involving Google Drive.
Categories
  • Endpoint
  • Web
  • Cloud
Data Sources
  • Process
  • Network Traffic
  • File
ATT&CK Techniques
  • T1105
Created: 2023-06-19