Potentially Suspicious File Download From ZIP TLD

Detects the download of a file with a potentially suspicious extension from a .zip top level domain.

Sigma rule (View on GitHub)

 1title: Potentially Suspicious File Download From ZIP TLD
 2id: 0bb4bbeb-fe52-4044-b40c-430a04577ebe
 3status: test
 4description: Detects the download of a file with a potentially suspicious extension from a .zip top level domain.
 5references:
 6    - https://twitter.com/cyb3rops/status/1659175181695287297
 7    - https://fabian-voith.de/2020/06/25/sysmon-v11-1-reads-alternate-data-streams/
 8author: Florian Roth (Nextron Systems)
 9date: 2023/05/18
10tags:
11    - attack.defense_evasion
12logsource:
13    product: windows
14    category: create_stream_hash
15detection:
16    selection:
17        Contents|contains: '.zip/'
18        TargetFilename|contains:
19            - '.bat:Zone'
20            - '.dat:Zone'
21            - '.dll:Zone'
22            - '.doc:Zone'
23            - '.docm:Zone'
24            - '.exe:Zone'
25            - '.hta:Zone'
26            - '.pptm:Zone'
27            - '.ps1:Zone'
28            - '.rar:Zone'
29            - '.rtf:Zone'
30            - '.sct:Zone'
31            - '.vbe:Zone'
32            - '.vbs:Zone'
33            - '.ws:Zone'
34            - '.wsf:Zone'
35            - '.xll:Zone'
36            - '.xls:Zone'
37            - '.xlsm:Zone'
38            - '.zip:Zone'
39    condition: selection
40falsepositives:
41    - Legitimate file downloads from a websites and web services that uses the ".zip" top level domain.
42level: high

References

Related rules

to-top