heroui logo

Suspicious Ping/Del Command Combination

Sigma Rules

View Source
Summary
This detection rule identifies a potentially malicious technique commonly leveraged by ransomware actors, combining the use of the 'ping' command followed by the 'del' command in a single execution sequence. The 'ping' command is employed to induce a delay, allowing the attacker time to execute the 'del' command, which is responsible for file deletion. This sequence is particularly indicative of efforts to conceal the initial infected file by removing it shortly after infection, hence obscuring the attacker's tracks. The detection rule analyzes the command line execution for specific patterns indicative of this behavior, including checks for parameters that might accompany the 'ping' and 'del' commands. By establishing this detection logic, organizations can bolster their defenses against ransomware attacks that exploit such command combinations.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-11-03