
Summary
This detection rule focuses on identifying potentially malicious activity involving the execution of the "ConfigSecurityPolicy.EXE" binary, which is part of Windows Defender and typically used to manage its configurations. Although originally intended for legitimate administrative purposes, attackers can exploit this executable to download or upload files to external locations via command-line arguments that incorporate web protocols. The rule captures this by monitoring process creation events, specifically targeting command-line executions that contain references to the executable and associated URL patterns (ftp, http, https). By utilizing conditions that check both the execution of the binary and the presence of web-based commands in the command line, the rule aims to identify instances where this tool is misused as an avenue for data exfiltration.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2021-11-26