Compressed File Creation Via Tar.EXE

Detects execution of "tar.exe" in order to create a compressed file. Adversaries may abuse various utilities to compress or encrypt data before exfiltration.

Sigma rule (View on GitHub)

 1title: Compressed File Creation Via Tar.EXE
 2id: 418a3163-3247-4b7b-9933-dcfcb7c52ea9
 3status: experimental
 4description: |
 5    Detects execution of "tar.exe" in order to create a compressed file.
 6    Adversaries may abuse various utilities to compress or encrypt data before exfiltration.    
 7references:
 8    - https://unit42.paloaltonetworks.com/chromeloader-malware/
 9    - https://lolbas-project.github.io/lolbas/Binaries/Tar/
10    - https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/cicada-apt10-japan-espionage
11author: Nasreddine Bencherchali (Nextron Systems), AdmU3
12date: 2023/12/19
13tags:
14    - attack.collection
15    - attack.exfiltration
16    - attack.t1560
17    - attack.t1560.001
18logsource:
19    product: windows
20    category: process_creation
21detection:
22    selection_img:
23        - Image|endswith: '\tar.exe'
24        - OriginalFileName: 'bsdtar'
25    selection_create:
26        CommandLine|contains:
27            - '-c'
28            - '-r'
29            - '-u'
30    condition: all of selection_*
31falsepositives:
32    - Likely
33level: low

References

Related rules

to-top