Potential Cookies Session Hijacking

Detects execution of "curl.exe" with the "-c" flag in order to save cookie data.

Sigma rule (View on GitHub)

 1title: Potential Cookies Session Hijacking
 2id: 5a6e1e16-07de-48d8-8aae-faa766c05e88
 3status: experimental
 4description: Detects execution of "curl.exe" with the "-c" flag in order to save cookie data.
 5references:
 6    - https://curl.se/docs/manpage.html
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2023/07/27
 9tags:
10    - attack.execution
11logsource:
12    product: windows
13    category: process_creation
14detection:
15    selection_img:
16        - Image|endswith: '\curl.exe'
17        - OriginalFileName: 'curl.exe'
18    selection_cli:
19        - CommandLine|re: '\s-c\s'
20        - CommandLine|contains: '--cookie-jar'
21    condition: all of selection_*
22falsepositives:
23    - Unknown
24level: medium

References

Related rules

to-top