
Summary
This detection rule targets potentially malicious data exfiltration behavior through command line tools on Windows systems. The rule specifically monitors for the execution of common command-line utilities such as PowerShell, curl, and wget when they are used to send data externally. Various command-line patterns are examined, focusing on key commands known for web requests, such as 'Invoke-WebRequest', 'curl' options, and 'wget' arguments. Additionally, the detection logic evaluates for a range of payload signatures that indicate system information retrieval or file content outputs directed towards an external entity. The overall condition combines the detection of these suspicious command patterns and payloads, marking the activity as high-risk potential for data exfiltration. This proactive approach is critical in identifying threats leveraging command-line interfaces to bypass traditional security measures, especially considering the rise in sophisticated cyber-attacks that utilize such tactics.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-08-02