
Summary
This detection rule identifies potentially suspicious file downloads executed via wget.exe from known file-sharing domains. It aims to mitigate risk by monitoring process creation events on Windows systems, specifically targeting scenarios where the wget command is used to pull files from various potentially harmful online locations. The rule utilizes a comprehensive set of criteria, including examining the command line parameters for specific command options often associated with wget, as well as checking against a list of categorized websites notorious for file sharing and potentially malicious content. The rule is configured to trigger an alert when all selections are met, providing a high confidence detection against potentially unauthorized or harmful downloads.
Categories
- Endpoint
- Windows
- Web
Data Sources
- Process
Created: 2023-05-05