
Summary
This detection rule focuses on the potential staging of collected data by adversaries on local systems prior to data exfiltration. It identifies specific commands often used in conjunction with file output operations, such as directing data to files with specific extensions. The use of common output commands, including redirection operators (like '>' and '>>') and the PowerShell command 'Out-File,' are leveraged to filter pertinent Sysmon events. The rule, formulated for a Splunk environment, uses a regular expression to detect processes that employ these commands followed by file names that end with common extensions, thereby indicating the possible preparation for data exfiltration. By examining these events, the detection system aims to identify potentially malicious activities associated with well-known threat actor groups linked to data staging techniques.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1074.001
Created: 2024-02-09