Rule Library

Sigma Rules

86 rules found for "attack.T1105"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionlowstable

Remote File Copy

Detects the use of tools that copy files from or to remote systems

Linux
TA0011 · Command and ControlTA0008 · Lateral MovementT1105 · Ingress Tool Transfer
Ömer GünalThu Jun 18linux
Detectionmediumtest

Wget Creating Files in Tmp Directory

Detects the use of wget to download content in a temporary directory such as "/tmp" or "/var/tmp"

LinuxFile Event
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Joseliyo SanchezFri Jun 02linux
Detectionlowtest

Curl Usage on Linux

Detects a curl process start on linux, which indicates a file download from a remote location or a simple web request to a remote server

LinuxProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Suspicious Curl File Upload - Linux

Detects a suspicious curl process start the adds a file to a web request

LinuxProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)+1Thu Sep 15linux
Detectionmediumtest

Download File To Potentially Suspicious Directory Via Wget

Detects the use of wget to download content to a suspicious directory

LinuxProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Hidden Flag Set On File/Directory Via Chflags - MacOS

Detects the execution of the "chflags" utility with the "hidden" flag, in order to hide files on MacOS. When a file or directory has this hidden flag set, it becomes invisible to the default file listing commands and in graphical file browsers.

macOSProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Omar KhaledWed Aug 21macos
Detectionmediumtest

File Download Via Nscurl - MacOS

Detects the execution of the nscurl utility in order to download files.

macOSProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Daniel CortezTue Jun 04macos
Detectionmediumtest

Potential In-Memory Download And Compile Of Payloads

Detects potential in-memory downloading and compiling of applets using curl and osacompile as seen used by XCSSET malware

macOSProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1059.007 · JavaScriptT1105 · Ingress Tool Transfer
Sohan G (D4rkCiph3r)+1Tue Aug 22macos
Detectionlowtest

Cisco Stage Data

Various protocols maybe used to put data on the device for exfil or infil

Ciscoaaa
TA0009 · CollectionTA0008 · Lateral MovementTA0011 · Command and ControlTA0010 · Exfiltration+3
Austin ClarkMon Aug 12network
Detectionmediumtest

Executable from Webdav

Detects executable access via webdav6. Can be seen in APT 29 such as from the emulated APT 29 hackathon https://github.com/OTRF/detection-hackathon-apt29/

Zeek (Bro)http
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
SOC Prime+1Fri May 01network
Detectionmediumtest

Download from Suspicious Dyndns Hosts

Detects download of certain file types from hosts with dynamic DNS names (selected list)

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1568 · Dynamic Resolution
Florian Roth (Nextron Systems)Wed Nov 08web
Detectionhightest

Password Protected ZIP File Opened (Suspicious Filenames)

Detects the extraction of password protected ZIP archives with suspicious file names. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0011 · Command and ControlTA0005 · Defense EvasionT1027 · Obfuscated Files or InformationT1105 · Ingress Tool Transfer+1
Florian Roth (Nextron Systems)Mon May 09windows
Detectionmediumtest

AppX Package Installation Attempts Via AppInstaller.EXE

Detects DNS queries made by "AppInstaller.EXE". The AppInstaller is the default handler for the "ms-appinstaller" URI. It attempts to load/install a package from the referenced URL

WindowsDNS Query
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautWed Nov 24windows
Detectionhighexperimental

Suspicious File Created by ArcSOC.exe

Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS server, creates a file with suspicious file type, indicating that it may be an executable, script file, or otherwise unusual.

WindowsFile Event
TA0005 · Defense EvasionTA0011 · Command and ControlTA0003 · PersistenceTA0001 · Initial Access+3
Micah BabinskiTue Nov 25windows
Detectionmediumexperimental

Potentially Suspicious File Creation by OpenEDR's ITSMService

Detects the creation of potentially suspicious files by OpenEDR's ITSMService process. The ITSMService is responsible for remote management operations and can create files on the system through the Process Explorer or file management features. While legitimate for IT operations, creation of executable or script files could indicate unauthorized file uploads, data staging, or malicious file deployment.

WindowsFile Event
TA0011 · Command and ControlT1105 · Ingress Tool TransferTA0008 · Lateral MovementT1570 · Lateral Tool Transfer+1
kostastsaleThu Feb 19windows
Detectionlowexperimental

Suspicious Deno File Written from Remote Source

Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL. This behavior may indicate an attempt to execute remotely hosted, potentially malicious files through deno.

WindowsFile Event
TA0002 · ExecutionT1204 · User ExecutionT1059.007 · JavaScriptTA0011 · Command and Control+1
Josh Nickels+1Thu May 22windows
Detectionhightest

Suspicious Desktopimgdownldr Target File

Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension

WindowsFile Event
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)Fri Jul 03windows
Detectionhighexperimental

Legitimate Application Writing Files In Uncommon Location

Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution. Adversaries may leverage legitimate applications (Living off the Land Binaries - LOLBins) to drop or download malicious files to uncommon locations on the system to evade detection by security solutions.

WindowsFile Event
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Dec 10windows
Detectionhightest

Uncommon Network Connection Initiated By Certutil.EXE

Detects a network connection initiated by the certutil.exe utility. Attackers can abuse the utility in order to download malware or additional payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Fri Sep 02windows
Detectionhightest

Suspicious Dropbox API Usage

Detects an executable that isn't dropbox but communicates with the Dropbox API

WindowsNetwork Connection
TA0011 · Command and ControlTA0010 · ExfiltrationT1105 · Ingress Tool TransferT1567.002 · Exfiltration to Cloud Storage
Florian Roth (Nextron Systems)Wed Apr 20windows
Detectionmediumtest

Suspicious Non-Browser Network Communication With Telegram API

Detects an a non-browser process interacting with the Telegram API which could indicate use of a covert C2

WindowsNetwork Connection
TA0011 · Command and ControlTA0010 · ExfiltrationT1102 · Web ServiceT1567 · Exfiltration Over Web Service+1
Nasreddine Bencherchali (Nextron Systems)Fri May 19windows
Detectionhightest

Network Connection Initiated By IMEWDBLD.EXE

Detects a network connection initiated by IMEWDBLD.EXE. This might indicate potential abuse of the utility as a LOLBIN in order to download arbitrary files or additional payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSat Jan 22windows
Detectionhightest

Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder

Detects executables located in potentially suspicious directories initiating network connections towards file sharing domains.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Thu Aug 30windows
Detectionhightest

Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location

Detects a network connection initiated by programs or processes running from suspicious or uncommon files system locations.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Sun Mar 19windows
Detectionmediumtest

Local Network Connection Initiated By Script Interpreter

Detects a script interpreter (Wscript/Cscript) initiating a local network connection to download or execute a script hosted on a shared folder.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSun Aug 28windows
Detectionhightest

Outbound Network Connection Initiated By Script Interpreter

Detects a script interpreter wscript/cscript opening a network connection to a non-local network. Adversaries may use script to download malicious payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Sun Aug 28windows
Detectionmediumtest

Potential COM Objects Download Cradles Usage - PS Script

Detects usage of COM objects that can be abused to download files in PowerShell by CLSID

WindowsPowerShell Script
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSun Dec 25windows
Detectionmediumtest

File Download Via Bitsadmin

Detects usage of bitsadmin downloading a file

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Michael Haag+1Thu Mar 09windows
Detectionhightest

Suspicious Download From File-Sharing Website Via Bitsadmin

Detects usage of bitsadmin downloading a file from a suspicious domain

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Florian Roth (Nextron Systems)Tue Jun 28windows
Detectionhightest

File With Suspicious Extension Downloaded Via Bitsadmin

Detects usage of bitsadmin downloading a file with a suspicious extension

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Florian Roth (Nextron Systems)+1Tue Jun 28windows
Detectionhightest

File Download Via Bitsadmin To A Suspicious Target Folder

Detects usage of bitsadmin downloading a file to a suspicious target folder

WindowsProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceT1197 · BITS JobsS0190 · S0190+3
Florian Roth (Nextron Systems)+1Tue Jun 28windows
Detectionlowtest

Browser Execution In Headless Mode

Detects execution of Chromium based browser in headless mode

WindowsProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1564.003 · Hidden Window
Nasreddine Bencherchali (Nextron Systems)Tue Sep 12windows
Detectionhightest

File Download with Headless Browser

Detects execution of chromium based browser in headless mode using the "dump-dom" command line to download files

WindowsProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1564.003 · Hidden Window
Sreeman+1Tue Jan 04windows
Detectionmediumtest

File Download From Browser Process Via Inline URL

Detects execution of a browser process with a URL argument pointing to a file with a potentially interesting extension. This can be abused to download arbitrary files or to hide from the user for example by launching the browser in a minimized state.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Tue Jan 11windows
Detectionmediumtest

File Download via CertOC.EXE

Detects when a user downloads a file by using CertOC.exe

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Mon May 16windows
Detectionhightest

File Download From IP Based URL Via CertOC.EXE

Detects when a user downloads a file from an IP based URL using CertOC.exe

WindowsProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Oct 18windows
Detectionhighexperimental

Suspicious CertReq Command to Download

Detects a suspicious CertReq execution downloading a file. This behavior is often used by attackers to download additional payloads or configuration files. Certreq is a built-in Windows utility used to request and retrieve certificates from a certification authority (CA). However, it can be abused by threat actors for malicious purposes.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Christian Burkard (Nextron Systems)Wed Nov 24windows
Detectionmediumtest

Suspicious Download Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+3Wed Feb 15windows
Detectionhightest

Suspicious File Downloaded From Direct IP Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files from direct IPs.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionhightest

Suspicious File Downloaded From File-Sharing Website Via Certutil.EXE

Detects the execution of certutil with certain flags that allow the utility to download files from file-sharing websites.

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Feb 15windows
Detectionhightest

Curl Download And Execute Combination

Adversaries can use curl to download payloads remotely and execute them. Curl is included by default in Windows 10 build 17063 and later.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy ExecutionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Sreeman+1Mon Jan 13windows
Detectionmediumtest

Command Line Execution with Suspicious URL and AppData Strings

Detects a suspicious command line execution that includes an URL and AppData string in the command line parameters as used by several droppers (js/vbs > powershell)

WindowsProcess Creation
TA0002 · ExecutionTA0011 · Command and ControlT1059.003 · Windows Command ShellT1059.001 · PowerShell+1
Florian Roth (Nextron Systems)+2Wed Jan 16windows
Detectionmediumtest

Potential Download/Upload Activity Using Type Command

Detects usage of the "type" command to download/upload data from WebDAV server

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Wed Dec 14windows
Detectionhightest

Suspicious Curl.EXE Download

Detects a suspicious curl process start on Windows and outputs the requested document to a local file

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Fri Jul 03windows
Detectionmediumtest

Remote File Download Via Desktopimgdownldr Utility

Detects the desktopimgdownldr utility being used to download a remote file. An adversary may use desktopimgdownldr to download arbitrary files as an alternative to certutil.

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Tim Rauch+1Tue Sep 27windows
Detectionhightest

Suspicious Desktopimgdownldr Command

Detects a suspicious Microsoft desktopimgdownldr execution with parameters used to download files from the Internet

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)Fri Jul 03windows
Detectionmediumtest

Remote File Download Via Findstr.EXE

Detects execution of "findstr" with specific flags and a remote share path. This specific set of CLI flags would allow "findstr" to download the content of the file located on the remote share as described in the LOLBAS entry.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows
Detectionlowtest

Insensitive Subfolder Search Via Findstr.EXE

Detects execution of findstr with the "s" and "i" flags for a "subfolder" and "insensitive" search respectively. Attackers sometimes leverage this built-in utility to search the system for interesting files or filter through results of commands.

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Furkan CALISKAN+2Mon Oct 05windows