
Summary
This rule aims to detect potentially malicious file downloads initiated through `curl.exe` from known file sharing domains. The detection focuses on various attributes of the process creation event, particularly the command line used during the file download. Specific conditions are set to identify downloads that may leverage the `curl` tool to fetch files from suspicious websites, such as those associated with file sharing or temporary storage services. If the command line contains certain flags typically used to specify output file names (like `-O`, `--remote-name`, and `--output`), along with certain file extensions known to be used in malicious payloads (such as `.ps1`, `.exe`, `.bat`, etc.), the rule will trigger an alert. This is particularly useful for identifying potential insider threats or external attacks where malicious actors may use `curl` to download and execute payloads without detection.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-05-05