
Summary
This detection rule identifies the execution of 'tar.exe' as a process in Windows systems, particularly focusing on its use to extract files from compressed archives. Adversaries may exploit tools like tar to decompress data as a means to evade detection mechanisms, making it a notable vector in attacks that involve information gathering or exfiltration. The rule specifies conditions that include the filename ending with 'tar.exe' or the original filename being 'bsdtar', along with a command line that must include the extraction flag '-x'. This multi-condition detection ensures that any legitimate or executable misuse of the tar utility is flagged for further investigation. False positives are possible, especially in environments where legitimate uses of file extraction occur regularly, but they are deemed likely due to the nature of the utility's common usage.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2023-12-19