Suspicious File Downloaded from Google Drive
Identifies suspicious file download activity from a Google Drive URL. This could indicate an attempt to deliver phishing payloads via a trusted webservice.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2023/06/19"
3integration = ["endpoint", "system"]
4maturity = "production"
5updated_date = "2024/08/09"
6
7[rule]
8author = ["Elastic"]
9description = """
10Identifies suspicious file download activity from a Google Drive URL. This could indicate an attempt to deliver phishing
11payloads via a trusted webservice.
12"""
13false_positives = [
14 "Approved third-party applications that use Google Drive download URLs.",
15 "Legitimate publicly shared files from Google Drive.",
16]
17from = "now-9m"
18index = ["auditbeat-*", "logs-endpoint*", "logs-system.security*", "winlogbeat-*"]
19language = "eql"
20license = "Elastic License v2"
21name = "Suspicious File Downloaded from Google Drive"
22references = ["https://intelligence.abnormalsecurity.com/blog/google-drive-matanbuchus-malware"]
23risk_score = 47
24rule_id = "a8afdce2-0ec1-11ee-b843-f661ea17fbcd"
25severity = "medium"
26tags = [
27 "Domain: Endpoint",
28 "OS: Linux",
29 "OS: Windows",
30 "OS: macOS",
31 "Use Case: Threat Detection",
32 "Tactic: Command and Control",
33 "Data Source: System",
34]
35timestamp_override = "event.ingested"
36type = "eql"
37
38query = '''
39process where
40
41 /* common browser processes */
42 event.action in ("exec", "fork", "start") and
43
44 process.name : ("Microsoft Edge", "chrome.exe", "Google Chrome", "google-chrome-stable",
45 "google-chrome-beta", "google-chrome", "msedge.exe", "firefox.exe", "brave.exe",
46 "whale.exe", "browser.exe", "dragon.exe", "vivaldi.exe", "opera.exe", "firefox",
47 "powershell.exe", "curl", "curl.exe", "wget", "wget.exe") and
48
49 /* Look for Google Drive download URL with AV flag skipping */
50 (process.command_line : "*drive.google.com*" and process.command_line : "*export=download*" and process.command_line : "*confirm=no_antivirus*")
51'''
52
53
54[[rule.threat]]
55framework = "MITRE ATT&CK"
56[[rule.threat.technique]]
57id = "T1105"
58name = "Ingress Tool Transfer"
59reference = "https://attack.mitre.org/techniques/T1105/"
60
61
62[rule.threat.tactic]
63id = "TA0011"
64name = "Command and Control"
65reference = "https://attack.mitre.org/tactics/TA0011/"
References
Related rules
- Ingress Transfer via Windows BITS
- Apple Script Execution followed by Network Connection
- Bash Shell Profile Modification
- EggShell Backdoor Execution
- MacOS Installer Package Spawns Network Event