heroui logo

Potentially Suspicious Child Process Of WinRAR.EXE

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potentially suspicious child processes that are spawned from WinRAR.exe, specifically targeting the malicious usage of command line interfaces and scripting engines like cmd.exe, PowerShell, and others. The rule is particularly relevant in the context of the recently disclosed WinRAR vulnerability (CVE-2023-38831), which could allow attackers to exploit WinRAR for remote code execution. By defining a parent process filter for WinRAR and a series of common executables often leveraged in attacks as children, the rule aims to catch potentially unauthorized or malicious behaviors occurring in a Windows environment. The detection logic utilizes a combination of conditions to ensure that a process is identified as suspicious only when it is indeed a child of WinRAR and matches the specified characteristics of potentially malicious scripts. The level of concern is marked as medium given the nature of the associated risks and potential impacts of exploitation.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-08-31