
Summary
This detection rule identifies potential misuse of the "Squirrel.exe" executable, commonly associated with Electron-based applications like Slack, Teams, and Discord. It monitors for instances where Squirrel.exe is used to download arbitrary files, which can be indicative of malicious activity, particularly when an attacker exploits these applications to deliver harmful content. The rule focuses on specific command line behaviors associated with Squirrel.exe, particularly those that involve downloading or updating parameters that include HTTP commands. By capturing relevant processes that match these criteria, this rule helps ensure that unusual or unauthorized file downloads are flagged for further investigation.
Categories
- Windows
- Endpoint
- Application
- Cloud
- Infrastructure
Data Sources
- Process
- File
- Application Log
Created: 2022-06-09