heroui logo

Command Line Execution with Suspicious URL and AppData Strings

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious command line executions involving `cmd.exe` that contain a suspicious URL and an AppData string in their command line parameters. This pattern is commonly associated with various dropper techniques, particularly those involving JavaScript or VBScript in combination with PowerShell. By examining the command line parameters for the presence of 'http', '://', and '%AppData%', the rule aims to flag executions that may signify an attempt to download or execute payloads from the internet, which is frequently used in malware delivery methods. The use of AppData indicates possible evasion tactics, as attackers often leverage this directory to store or execute malicious components without raising immediate suspicion. This rule is flagged as medium risk, recognizing the possibility of legitimate uses but prioritizing detection due to the increasing prevalence of such attack vectors. It is crucial to analyze instances of this detection in the context of the broader environment to mitigate false positives.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2019-01-16