Files
blue-team-tools/rules/windows/sysmon/sysmon_detect_Compressed_Process.yml
T

24 lines
544 B
YAML
Raw Normal View History

2019-08-28 10:12:01 +07:00
title: Detect compress process using for data exfiltration
description: Detects data compressing behaviour
author: Lep - VuNX
date: 2019/7/10
tags:
2019-08-28 17:13:54 +07:00
- attack.exfiltration
- attack.t1002
2019-08-28 10:12:01 +07:00
logsource:
2019-08-28 17:13:54 +07:00
category: process_creation
product: windows
2019-08-28 10:12:01 +07:00
detection:
selection1:
CommandLine:
- '*Compress-Archive*'
- 'rar*'
- 'zip*'
- 'gzip*'
selection2:
Image: C:\Users\Public\7za.exe
condition: selection1 or selection2
falsepositives:
- Real compressed
level: critical