
Summary
This detection rule identifies the execution of the 'sqlite' binary which may indicate an unauthorized attempt to access database files in Chromium-based browsers, potentially for the purpose of data exfiltration. Using criteria that include specific command-line arguments related to Chromium and SQLite binaries, the rule focuses on monitoring process creation events on Windows systems. Specifically, the detection targets instances where the command line contains paths typical of user data directories or database files associated with Chromium, Opera, or similar browsers. This includes terms like 'Cookies', 'Login Data', 'Web Data', and 'History'. The intention behind this rule is to flag potentially malicious behavior linked to credential access, particularly when third-party applications or attackers try to gain access to sensitive information stored in the browser's SQLite databases. The rule operates under the assumption that legitimate SQLite usage in this context is rare, thereby raising the alert level for any matching instances. Users and security teams should investigate these alerts to determine if they correlate with malicious activity, given the high severity of potential data breaches.
Categories
- Endpoint
- Windows
- Application
Data Sources
- Process
ATT&CK Techniques
- T1539
Created: 2022-12-19