VHD Image Download Via Browser
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects creation of ".vhd"/".vhdx" files by browser processes. Malware can use mountable Virtual Hard Disk ".vhd" files to encapsulate payloads and evade security controls.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "File Created or Modified" AND PROCESSNAME endswith "\brave.exe,\chrome.exe,\firefox.exe,\iexplore.exe,\maxthon.exe,\MicrosoftEdge.exe,\msedge.exe,\msedgewebview2.exe,\opera.exe,\safari.exe,\seamonkey.exe,\vivaldi.exe,\whale.exe" AND (FILENAME contains ".vhd" OR OBJECTNAME contains ".vhd") select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.FILENAME,Action1.PROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
frack113, Christopher Peacock '@securepeacock', SCYTHE '@scythe_io'


