
Summary
This detection rule monitors for the execution of the `findstr.exe` command-line utility with certain specific flags that indicate a potential attempt to download a file from a remote share. It is based on techniques described in the LOLBAS (Living Off The Land Binaries and Scripts) project, which identifies binaries that can be used by adversaries to achieve their objectives without the need for traditional malware. The rule's logic looks for the `findstr` command's invocation along with specific parameters such as `-v` or `-l`, and it also checks for remote file paths indicating a connection to an external resource. If all conditions are met, it raises a detection alert. The rule is categorized under a medium severity level, and potential false positives may arise depending on the context of the environment.
Categories
- Windows
Data Sources
- Process
Created: 2020-10-05