
Summary
The 'Unusual HTTP Download' detection rule is designed to identify potential malicious download activities occurring via web browsers or command-line tools such as wget. The detection leverages Windows Sysmon event logs, particularly focusing on EventCodes that indicate HTTP(S) protocols are being utilized. The rule filters for downloads through specific browser processes, including Chrome, Firefox, Internet Explorer, Opera, and Microsoft Edge, as well as other dynamic factors like source and destination IP addresses, ports, and the user associated with the action. By aggregating event data over a normalized 60-second window, it compiles a snapshot of download events that warrant further examination, allowing security teams to focus their efforts where they are most needed in their network. The underlying logic is implemented in Splunk, pulling data relevant to HTTP downloads and visualizing it in a structured format for easier analysis.
Categories
- Endpoint
- Web
- Cloud
Data Sources
- Windows Registry
- Network Traffic
- Process
ATT&CK Techniques
- T1105
- T1071.001
Created: 2024-02-09