
Summary
This detection rule identifies suspicious executions of the 'GfxDownloadWrapper.exe' process, particularly when invoked with a URL as a command-line argument. The GfxDownloadWrapper.exe is often associated with downloading files from specified internet locations, which can be exploited by attackers to execute arbitrary file downloads, potentially leading to malicious payload outcomes. The rule is designed to raise alerts for any instances where this executable is run with URLs that follow standard web protocols (http or https), except for known legitimate ones filtered out by the specified condition. The detection logic uses patterns in command-line execution to differentiate between legitimate use cases and potentially malicious behavior.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
Created: 2020-10-09