heroui logo

Unusual File Download From File Sharing Websites - File Stream

Sigma Rules

View Source
Summary
This threat detection rule is designed to identify suspicious downloads of certain file types from well-known file sharing websites. Specifically, it triggers when files with extensions associated with script execution—such as .bat, .cmd, and .ps1—are downloaded from specific domains that are commonly used for file and paste sharing. The rule focuses on the download of files marked with a 'Zone Identifier' which indicates that these files might have originated from an untrusted source on the internet. The detection is sensitive to specific content in the filename and the domain from which the file is being downloaded, attempting to mitigate risks associated with potential malware delivery through these channels. By monitoring the 'create_stream_hash' log source category associated with Windows, the rule aims to catch and flag potentially harmful behaviors while acknowledging the possibility of false positives, as the sources can sometimes include legitimate downloads.
Categories
  • Windows
  • Cloud
  • Network
Data Sources
  • File
  • Network Traffic
Created: 2022-08-24