heroui logo

Compress Data and Lock With Password for Exfiltration With 7-ZIP

Sigma Rules

View Source
Summary
This detection rule is designed to identify the use of the 7-Zip application for compressing and encrypting data with a password, which is often a precursor to data exfiltration by adversaries. The rule focuses on monitoring process creation events to capture instances where 7-Zip is invoked with the presence of specific command-line arguments indicative of compression actions and password usage. The rule specifically looks for instances when the 7-Zip executable is invoked with the command-line options for adding files (' a ') or updating files (' u ') while also checking for the presence of the '-p' flag, which denotes the specification of a password. This combination of checks helps ensure that malicious behavior related to data exfiltration attempts via 7-Zip can be detected effectively. It is important to note that legitimate use cases for this functionality exist, such as users compressing files for storage, and thus false positives may occur.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1560.001
Created: 2021-07-27