
Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder
Sigma Rules
View SourceSummary
This detection rule identifies potentially malicious network activity characterized by executables residing in suspicious directories that initiate connections to known file-sharing domains. The focus of this rule is to intercept communications that may suggest data exfiltration or command-and-control (C2) activities linked to cyber threats. The rule specifically targets executable files found in directories commonly associated with temporary or non-user environments, such as `C:\$Recycle.bin`, `C:\Temp\`, and other system folders. The network requests are cross-referenced against a list of various file-sharing domains (e.g., GitHub, Discord CDN, Dropbox, etc.), known to be used by attackers for transferring stolen data or downloading injected payloads. A combination of the conditions ensures that only relevant network traffic involving these suspicious processes is flagged, offering researchers and incident response teams valuable insights into potential compromises in the system.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Process
- Network Traffic
Created: 2018-08-30