
Summary
The detection rule identifies the use of the 'rar.exe' application to compress files into an archive, which may be a precursor to data exfiltration by an adversary. This behavior is a part of the data collection phase where an attacker compresses potentially sensitive documents into a smaller file format to facilitate easier and stealthier transfer of data over the network. Specifically, the rule monitors process creation events, focusing on instances where 'rar.exe' is executed, especially when the command line arguments include ' a ', indicating that files are being added to an archive. The rule's low severity level suggests that while this action could indicate suspicious behavior, it may not always signify malicious intent, particularly in environments where 'rar.exe' is commonly used for legitimate purposes.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1560.001
Created: 2019-10-21