
Summary
This detection rule is designed to identify when executable files, such as .exe, .msi, or .bat files, are downloaded through a web proxy. Adversaries often use these file types to deliver malware or persistent access tools to a compromised environment. By monitoring web traffic and employing specific regex filters in the Splunk environment, the rule detects when these files are requested and successfully downloaded (indicated by HTTP GET requests with a status of 200). It also enriches the data by performing DNS lookups on destination IPs to identify the associated domain names and enriches location information for better context. This rule is relevant to known threat groups like APT31, APT36, and others, indicating its applicability for detecting sophisticated attacks.
Categories
- Web
- Endpoint
Data Sources
- Web Credential
- Network Traffic
- Firewall
ATT&CK Techniques
- T1105
Created: 2024-02-09