
Summary
This detection rule targets the misuse of `curl.exe` on Windows systems, a command-line tool commonly utilized for transferring data with URLs. Attackers may leverage this utility for data exfiltration, utilizing command-line arguments such as `-d`, `-T`, `--form`, `--upload-file`, and others to facilitate the transfer of sensitive information to remote servers. The rule set is designed to identify process creation events where `curl.exe` is executed with potential data or file upload flags, which could signify malicious activities such as Command and Control (C2) communications or the exfiltration of files post-compromise. The logic is implemented using a Splunk query that captures events from the Windows Sysmon data source, filtering for specific command-line arguments that indicate possible exfiltration attempts. Notably, the detection focuses on matching the process path of `curl.exe` and parsing relevant arguments indicating file transfer commands, compiling results into a user-readable format.
Categories
- Windows
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1048
Created: 2025-04-18