Files Added To An Archive Using Rar.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects usage of "rar" to add files to an archive for potential compression. An adversary may compress data (e.g. sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Severity

Attention

Rule Requirement

Criteria

Action1: actionname = "Process started" AND PROCESSNAME endswith "\rar.exe" AND COMMANDLINE contains " a " select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Timur Zinniatullin, E.M. Anhaus, oscd.community