
Summary
This detection rule is designed to identify suspicious usage of the RAR compression utility (rar.exe) on Windows systems. The primary intent of this rule is to capture instances where a RAR archive is created from designated folders that are either part of the system's infrastructure or commonly exploited by attackers to stage malicious activities. Specifically, the rule activates on command-line executions of rar.exe that meet certain criteria—such as creating an archive while navigating to unusually targeted directories (e.g., System folders, Temp directory, or specific user profiles). It focuses on command patterns that include certain flags primarily used for stealthy or greedy compression actions, which may point to malicious intentions. The rule uses a combination of 'selection' statements to ensure it captures potentially nefarious activities without overreacting to benign uses of rar.exe, although it still may generate false positives. Overall, the rule aims to enhance the security posture by monitoring critical areas in a Windows environment and respond to potential misuse of the RAR tool.
Categories
- Windows
- Endpoint
- Network
- Infrastructure
Data Sources
- Process
Created: 2022-12-15