heroui logo

Revil Common Exec Parameter

Splunk Security Content

View Source
Summary
This detection rule targets the specific command-line parameters often associated with the REVIL ransomware, such as "-nolan", "-nolocal", "-fast", and "-full". It operates by utilizing data collected from Endpoint Detection and Response (EDR) solutions, specifically focusing on process execution logs as outlined in the `Processes` node of the `Endpoint` data model. The significance of this rule lies in its ability to quickly identify potential ransomware activities that may lead to mass file encryption and operational disruptions. When a process is executed with any of the specified parameters, it raises flags indicating a possible ransomware attack, allowing for prompt incident response. This rule is robust against false positives stemming from benign applications that might inadvertently use the same parameters; however, the context of use is critical for correct evaluation. Therefore, continuous tuning and monitoring are required to minimize false alerts while ensuring genuine threats are effectively addressed.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1204
Created: 2024-11-13