heroui logo

Potentially Suspicious Ping/Copy Command Combination

Sigma Rules

View Source
Summary
This detection rule aims to identify potentially malicious activities utilizing a specific combination of Windows command line arguments, specifically when both 'ping' and 'copy' commands are executed in a single command line instruction. Such command-line combinations are not typical for legitimate usage, leading to suspicion that an attacker could be attempting to exfiltrate data or execute unauthorized actions. The structure of the rule outlines specific criteria, focusing on the execution of 'cmd.exe' with command lines that include both 'ping' and 'copy', alongside variations that incorporate common network ping options. These characteristics can signal attempts at defense evasion or data manipulation by malware. Therefore, monitoring for such command combinations can enhance security posture and facilitate timely incident response in environments particularly susceptible to exploitation through benign command line interfaces.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-07-18