VHD Image Download Via Browser

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects creation of ".vhd"/".vhdx" files by browser processes. Malware can use mountable Virtual Hard Disk ".vhd" files to encapsulate payloads and evade security controls.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "File Created or Modified" AND PROCESSNAME endswith "\brave.exe,\chrome.exe,\firefox.exe,\iexplore.exe,\maxthon.exe,\MicrosoftEdge.exe,\msedge.exe,\msedgewebview2.exe,\opera.exe,\safari.exe,\seamonkey.exe,\vivaldi.exe,\whale.exe" AND (FILENAME contains ".vhd" OR OBJECTNAME contains ".vhd") select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.FILENAME,Action1.PROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io'