Files
blue-team-tools/rules/windows/process_creation/proc_creation_win_lolbas_extrac32.yml
T
2022-03-16 13:43:54 +01:00

29 lines
659 B
YAML

title: Suspicious Extrac32 Execution
id: aa8e035d-7be4-48d3-a944-102aec04400d
status: experimental
description: Download or Copy file with Extrac32
references:
- https://lolbas-project.github.io/lolbas/Binaries/Extrac32/
tags:
- attack.defense_evasion
- attack.t1564.004
author: frack113
date: 2021/11/26
logsource:
category: process_creation
product: windows
detection:
lolbas:
CommandLine|contains|all:
- extrac32.exe
- .cab
options:
CommandLine|contains:
- /C
- /Y
- ' \\'
condition: lolbas and options
falsepositives:
- Unknown
level: medium