
Summary
This detection rule identifies the usage of Curl, specifically the Curl.exe application on Windows, which can be exploited by adversaries to upload files to remote servers. The rule focuses on monitoring command-line arguments associated with file uploads, such as '-T', '--upload-file', '-d', '--data', and '-F', through process execution logs. By detecting these arguments in Sysmon and Windows Event Logs, analysts can pinpoint potentially malicious actions where data exfiltration is a concern. The implementation requires comprehensive data ingestion from EDR solutions to capture detailed process information, command-line usage, and network activity linked to uploads. If the upload activity is determined to be malicious post-analysis, endpoints may need to be isolated to prevent further data compromise. The guidance suggests that collaboration between security teams is essential for reviewing related logs and ensuring effective incident response.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1105
Created: 2024-12-10