
Summary
This detection rule identifies potentially malicious activity by monitoring the downloading of certain file types from direct IP addresses rather than domain names. It is often indicative of circumvention of security measures such as filtering based on trusted domain names. The rule specifically targets different file extensions associated with scripts and executable files (e.g., .ps1, .bat, .exe) which are commonly used in attack scenarios. The detection leverages the log category related to stream hashing on Windows systems, examining the 'Contents' and 'TargetFilename' for specific patterns defined in the regular expression and in the list of file name conditions. By capturing these events, the rule helps mitigate risks associated with using direct IP addresses to deliver potentially harmful files, which is a common tactic used in various exploitation techniques.
Categories
- Windows
- Endpoint
- Network
Data Sources
- Windows Registry
- File
- Network Traffic
Created: 2022-09-07