heroui logo

Potentially Suspicious File Download From File Sharing Domain Via PowerShell.EXE

Sigma Rules

View Source
Summary
This detection rule monitors for suspicious file downloads made via PowerShell.exe from known file sharing domains. It identifies related commands that may indicate potentially malicious activity, especially if files are obtained from domains historically associated with threat actor activities. Specifically, it targets PowerShell executions that leverage commands like `DownloadString`, `DownloadFile`, and `Invoke-WebRequest`, which are frequently utilized by attackers to download payloads or tools from external locations. The rule includes a comprehensive list of suspicious websites often used for this purpose. Increased vigilance is applied when these commands are issued from PowerShell, indicating possible exploitation in progress. As the threat landscape evolves, this rule allows security teams to capture indicators of potentially harmful downloads at an early stage, thus enabling proactive measures to mitigate risks.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2024-02-23