heroui logo

Response File Execution Via Odbcconf.EXE

Sigma Rules

View Source
Summary
This detection rule identifies the execution of the `odbcconf.exe` binary with the `-f` command-line flag, which is often used to load a response file. Response files, denoted typically with an `.rsp` extension, can be manipulated to carry out malicious actions. The rule is particularly relevant in contexts where attackers abuse legitimate system binaries to evade detection by using such command-line arguments to execute potentially harmful payloads hidden within the response files. The detection logic inspects process creation events, specifically looking for instances where `odbcconf.exe` is executed with parameters that indicate the use of a response file. Given the nature of certain activities that misuse the ODBC configuration utility, further investigation of any identified executions is advised.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2023-05-22