Suspicious Curl.EXE Download
Detects a suspicious curl process start on Windows and outputs the requested document to a local file
Sigma rule (View on GitHub)
1title: Suspicious Curl.EXE Download
2id: e218595b-bbe7-4ee5-8a96-f32a24ad3468
3related:
4 - id: bbeaed61-1990-4773-bf57-b81dbad7db2d # Basic curl execution
5 type: derived
6 - id: 9a517fca-4ba3-4629-9278-a68694697b81 # Curl download
7 type: similar
8status: test
9description: Detects a suspicious curl process start on Windows and outputs the requested document to a local file
10references:
11 - https://twitter.com/max_mal_/status/1542461200797163522
12 - https://web.archive.org/web/20200128160046/https://twitter.com/reegun21/status/1222093798009790464
13 - https://github.com/pr0xylife/Qakbot/blob/4f0795d79dabee5bc9dd69f17a626b48852e7869/Qakbot_AA_23.06.2022.txt
14 - https://www.volexity.com/blog/2022/07/28/sharptongue-deploys-clever-mail-stealing-browser-extension-sharpext/
15 - https://github.com/redcanaryco/atomic-red-team/blob/0f229c0e42bfe7ca736a14023836d65baa941ed2/atomics/T1105/T1105.md#atomic-test-18---curl-download-file
16author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
17date: 2020-07-03
18modified: 2023-02-21
19tags:
20 - attack.command-and-control
21 - attack.t1105
22logsource:
23 category: process_creation
24 product: windows
25detection:
26 selection_curl:
27 - Image|endswith: '\curl.exe'
28 - Product: 'The curl executable'
29 selection_susp_locations:
30 CommandLine|contains:
31 - '%AppData%'
32 - '%Public%'
33 - '%Temp%'
34 - '%tmp%'
35 - '\AppData\'
36 - '\Desktop\'
37 - '\Temp\'
38 - '\Users\Public\'
39 - 'C:\PerfLogs\'
40 - 'C:\ProgramData\'
41 - 'C:\Windows\Temp\'
42 selection_susp_extensions:
43 CommandLine|endswith:
44 - '.dll'
45 - '.gif'
46 - '.jpeg'
47 - '.jpg'
48 - '.png'
49 - '.temp'
50 - '.tmp'
51 - '.txt'
52 - '.vbe'
53 - '.vbs'
54 filter_optional_git_windows:
55 # Example FP
56 # CommandLine: "C:\Program Files\Git\mingw64\bin\curl.exe" --silent --show-error --output C:/Users/test/AppData/Local/Temp/gfw-httpget-jVOEoxbS.txt --write-out %{http_code} https://gitforwindows.org/latest-tag.txt
57 ParentImage: 'C:\Program Files\Git\usr\bin\sh.exe'
58 Image: 'C:\Program Files\Git\mingw64\bin\curl.exe'
59 CommandLine|contains|all:
60 - '--silent --show-error --output '
61 - 'gfw-httpget-'
62 - 'AppData'
63 condition: selection_curl and 1 of selection_susp_* and not 1 of filter_optional_*
64falsepositives:
65 - Unknown
66level: high
References
Related rules
- AppX Package Installation Attempts Via AppInstaller.EXE
- Arbitrary File Download Via GfxDownloadWrapper.EXE
- Browser Execution In Headless Mode
- Cisco Stage Data
- Command Line Execution with Suspicious URL and AppData Strings