heroui logo

Potential File Download via a Headless Browser

Elastic Detection Rules

View Source
Summary
This detection rule identifies the potentially malicious activity of a headless browser downloading files from remote URLs via suspicious parent processes. The rule activates by capturing events from various data sources like Winlogbeat and Microsoft Defender for Endpoint. It specifically looks for process initiation events related to well-known browsers running in headless mode. Adversaries often leverage headless browsers to circumvent restrictions on tool transfers, thereby facilitating malware downloads while mimicking legitimate user behavior. Investigative steps include reviewing the process execution chain, network activity, and user account details to ascertain whether the download was authorized. Based on the findings, a structured incident response protocol is outlined, emphasizing containment, investigation of additional compromises, and strengthening defenses against similar future vectors. The rule is critical in environments where endpoint security is paramount, particularly on Windows-based systems.
Categories
  • Endpoint
  • Windows
  • Cloud
  • Infrastructure
Data Sources
  • Windows Registry
  • Process
  • Network Traffic
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1105
Created: 2024-05-10