Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rule: Renamed Curl Execution #4466

Closed
wants to merge 16 commits into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 28 additions & 0 deletions rules/windows/process_creation/proc_creation_win_renamed_curl.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
title: Renamed Curl Execution
id: 77b2c64f-5390-4a71-9d8d-a0488a920e42
status: experimental
description: Detects the execution of a renamed curl.exe binary, a technique often used by attackers to bypass security controls. Monitoring for such activity aids in quickly detecting potential unauthorized or malicious actions involving data transfer.
references:
- https://curl.se/
author: Florian Roth (Nextron Systems)
date: 2023/09/29
tags:
- attack.t1105
- attack.t1570
- attack.t1048
logsource:
category: process_creation
product: windows
detection:
selection:
- OriginalFileName: 'curl.exe'
- Description: 'The curl executable' # there are case-varied versions of this but Sigma is case-insensitive
- Company:
- 'curl, https://curl.se/' # there are case-varied versions of this but Sigma is case-insensitive
- 'curl, https://curl.haxx.se/' # there are case-varied versions of this but Sigma is case-insensitive
filter:
Image|contains: '\curl'
condition: selection and not filter
falsepositives:
- It's common for certain software to rename and use curl for legitimate purposes, so this can occasionally lead to false positives
level: medium