heroui logo

Compressed File Execution

Anvilogic Forge

View Source
Summary
The 'Compressed File Execution' detection rule is designed to identify instances where compressed executable files are executed on Windows platforms. Specifically, this rule targets any process that is launched from a compressed archive, such as ZIP files which may contain malicious executables. The logic for detection utilizes a Snowflake querying mechanism, examining the EDR (Endpoint Detection and Response) logs from CrowdStrike. It checks for the event time within the last two hours and validates that the platform is Windows. The main detection is performed using a regular expression that searches for a pattern indicating the execution of an executable file within a ZIP archive. This approach is crucial in recognizing complex threats where malware may be obfuscated to evade traditional detection mechanisms. The rule is particularly relevant to threat actors associated with various Advanced Persistent Threat (APT) groups and notable malware families, indicating a notable trend in cyber attacks involving compressed file formats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
ATT&CK Techniques
  • T1027
Created: 2024-02-09