heroui logo

Exfiltration via curl.exe - Windows

Anvilogic Forge

View Source
Summary
This detection rule targets the misuse of `curl.exe` on Windows systems, a command-line tool commonly utilized for transferring data with URLs. Attackers may leverage this utility for data exfiltration, utilizing command-line arguments such as `-d`, `-T`, `--form`, `--upload-file`, and others to facilitate the transfer of sensitive information to remote servers. The rule set is designed to identify process creation events where `curl.exe` is executed with potential data or file upload flags, which could signify malicious activities such as Command and Control (C2) communications or the exfiltration of files post-compromise. The logic is implemented using a Splunk query that captures events from the Windows Sysmon data source, filtering for specific command-line arguments that indicate possible exfiltration attempts. Notably, the detection focuses on matching the process path of `curl.exe` and parsing relevant arguments indicating file transfer commands, compiling results into a user-readable format.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1048
Created: 2025-04-18