WinRAR Zero-Day vulnerability exploitation
Last updated on:
In this page
About the rule
Rule Type
Advanced
Rule Description
Suspicious file execution from within archives indicating potential malware execution
Severity
Critical
Rule Requirement
Criteria
Action1: actionname = "suspicious_archive_extraction" AND (vulnerableTo(HOSTNAME, "CVE-2023-38831")) Action2: actionname = "Suspicious Execution from Archive" AND (vulnerableTo(HOSTNAME, "CVE-2023-38831")) sequence:Action1 followedby Action2 within 10m select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.FILENAME,Action1.PREVVAL,Action1.CHANGES,Action2.HOSTNAME,Action2.MESSAGE,Action2.COMMANDLINE,Action2.DOMAIN,Action2.FILE_NAME,Action2.PARENTPROCESSNAME,Action2.PROCESSNAME,Action2.USERNAME
Detection
Execution Mode
realtime
Log Sources
Windows


