heroui logo

Curl Download And Execute Combination

Sigma Rules

View Source
Summary
This detection rule is designed to identify potentially malicious usage of the `curl` command in Windows environments where attackers may leverage it to download and execute payloads remotely. Specifically, it focuses on `curl`, which is a common command-line tool for transferring data from or to a server using various protocols, including HTTP. Windows 10 build 17063 and later include `curl` by default, which can be exploited by adversaries for command-and-control (C2) and various evasion techniques. The rule inspects command line arguments for specific patterns indicating the use of `curl` in a way that suggests an attempt to download a file and run it directly. Such activity is often indicative of a download-execute pattern typical of malware installation processes. False positives may occur due to benign usages of `curl`, and therefore, thorough contextual analysis is advised when alerts trigger.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2020-01-13