Detection rules › Sigma

Suspicious File Download From IP Via Wget.EXE

Severity
high
Author
Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects potentially suspicious file downloads directly from IP addresses using Wget.exe

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\wget.exe'
OriginalFileName: wget.exe

Stage 2: all of selection_ip

CommandLine|re: '://[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'

Stage 3: all of selection_http

CommandLine|contains: http

Stage 4: all of selection_flag

or:
CommandLine|contains: --output-document
CommandLine|re: '\s-O\s'

Stage 5: all of selection_ext

or:
CommandLine|endswith: .bat
CommandLine|endswith: '.bat'''
CommandLine|endswith: '.bat"'
CommandLine|endswith: .dat
CommandLine|endswith: '.dat'''
CommandLine|endswith: '.dat"'
CommandLine|endswith: .dll
CommandLine|endswith: '.dll'''
CommandLine|endswith: '.dll"'
CommandLine|endswith: .exe
CommandLine|endswith: '.exe'''
CommandLine|endswith: '.exe"'
CommandLine|endswith: .hta
CommandLine|endswith: '.hta'''
CommandLine|endswith: '.hta"'
CommandLine|endswith: .msi
CommandLine|endswith: '.msi'''
CommandLine|endswith: '.msi"'
CommandLine|endswith: .ps1
CommandLine|endswith: '.ps1'''
CommandLine|endswith: '.ps1"'
CommandLine|endswith: .psm1
CommandLine|endswith: '.psm1'''
CommandLine|endswith: '.psm1"'
CommandLine|endswith: .vbe
CommandLine|endswith: '.vbe'''
CommandLine|endswith: '.vbe"'
CommandLine|endswith: .vbs
CommandLine|endswith: '.vbs'''
CommandLine|endswith: '.vbs"'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLineends_with
  • .bat corpus 5 (sigma 5)
  • .bat" corpus 5 (sigma 5)
  • .bat' corpus 5 (sigma 5)
  • .dat corpus 7 (sigma 7)
  • .dat" corpus 5 (sigma 5)
  • .dat' corpus 5 (sigma 5)
  • .dll corpus 9 (sigma 9)
  • .dll" corpus 6 (sigma 6)
  • .dll' corpus 6 (sigma 6)
  • .exe corpus 6 (sigma 6)
  • .exe" corpus 5 (sigma 5)
  • .exe' corpus 5 (sigma 5)
  • .hta corpus 6 (sigma 6)
  • .hta" corpus 5 (sigma 5)
  • .hta' corpus 5 (sigma 5)
  • .msi corpus 5 (sigma 5)
  • .msi" corpus 5 (sigma 5)
  • .msi' corpus 5 (sigma 5)
  • .ps1 corpus 6 (sigma 6)
  • .ps1" corpus 5 (sigma 5)
  • .ps1' corpus 5 (sigma 5)
  • .psm1 corpus 6 (sigma 6)
  • .psm1" corpus 5 (sigma 5)
  • .psm1' corpus 5 (sigma 5)
  • .vbe corpus 7 (sigma 7)
  • .vbe" corpus 5 (sigma 5)
  • .vbe' corpus 5 (sigma 5)
  • .vbs corpus 7 (sigma 7)
  • .vbs" corpus 5 (sigma 5)
  • .vbs' corpus 5 (sigma 5)
CommandLinematch
  • --output-document corpus 3 (sigma 3)
  • http corpus 31 (sigma 31)
CommandLineregex_match
  • ://[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3} corpus 5 (sigma 5)
  • \s-O\s corpus 3 (sigma 3)
Imageends_with
  • \wget.exe corpus 6 (sigma 6)
OriginalFileNameeq
  • wget.exe corpus 3 (sigma 3)