
Summary
The detection rule targets suspicious executions of the Extrac32 utility, a tool often used for file extraction which can also be misused for command and control activities in a malicious context. The rule encompasses several conditions for detection, including any command lines containing 'extrac32.exe', executable images named 'extrac32.exe', and associated archive file interactions. By scrutinizing the process creation logs for these patterns typically associated with the legitimate use of Extrac32, this rule aims to identify potentially unauthorized or malicious behavior related to the execution of this tool. Users are advised to evaluate alerts generated by this detection rule carefully, given the possibility of false positives due to legitimate usage in certain contexts.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2021-11-26