heroui logo

File Download And Execution Via IEExec.EXE

Sigma Rules

View Source
Summary
This rule is designed to detect the execution of the IEExec utility, which is commonly used for downloading and executing files from the internet. It focuses on monitoring process creation events specifically linked to IEExec.exe on Windows systems. The detection mechanism defines criteria for identifying instances where IEExec is executed either directly or through command line parameters that contain HTTP or HTTPS URLs. If any process creation events match these criteria, it indicates potential malicious activity, particularly related to command-and-control operations typical of web-based attacks. The rule is categorized as high severity due to the risks associated with unauthorized file downloads and executions.
Categories
  • Windows
Data Sources
  • Process
Created: 2022-05-16