
Summary
The detection rule titled 'Suspicious File Download From IP Via Wget.EXE' identifies potentially malicious activity involving the use of Wget.exe to download files directly from IP addresses. This can often signify an attempt to bypass security controls or utilize direct delivery methods for malicious payloads. The rule operates by monitoring process creation events in a Windows environment, specifically looking for instances where Wget.exe is invoked to download files from URLs containing direct IP addresses. The detection criteria include specific command-line parameters and file extensions that are commonly associated with malicious payloads, such as .ps1, .bat, .exe, and other executable/script file types. This high-level rule is classified under attack execution tactics and aims to flag actions that deviate from normal user behavior regarding file downloads. False positives may occur, and the rule has references for further details on Wget commands. Overall, this rule helps system administrators identify potential threats that may arise from direct file retrieval from IP addresses.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2023-07-27