EXPLORE
← Back to Explore
sigmahighHunting

Suspicious File Download From IP Via Wget.EXE

Detects potentially suspicious file downloads directly from IP addresses using Wget.exe

Detection Query

selection_img:
  - Image|endswith: \wget.exe
  - OriginalFileName: wget.exe
selection_ip:
  CommandLine|re: ://[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}
selection_http:
  CommandLine|contains: http
selection_flag:
  - CommandLine|re: \s-O\s
  - CommandLine|contains: --output-document
selection_ext:
  CommandLine|endswith:
    - .ps1
    - .ps1'
    - .ps1"
    - .dat
    - .dat'
    - .dat"
    - .msi
    - .msi'
    - .msi"
    - .bat
    - .bat'
    - .bat"
    - .exe
    - .exe'
    - .exe"
    - .vbs
    - .vbs'
    - .vbs"
    - .vbe
    - .vbe'
    - .vbe"
    - .hta
    - .hta'
    - .hta"
    - .dll
    - .dll'
    - .dll"
    - .psm1
    - .psm1'
    - .psm1"
condition: all of selection_*

Author

Nasreddine Bencherchali (Nextron Systems)

Created

2023-07-27

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.execution
Raw Content
title: Suspicious File Download From IP Via Wget.EXE
id: 17f0c0a8-8bd5-4ee0-8c5f-a342c0199f35
status: test
description: Detects potentially suspicious file downloads directly from IP addresses using Wget.exe
references:
    - https://www.gnu.org/software/wget/manual/wget.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-07-27
tags:
    - attack.execution
logsource:
    category: process_creation
    product: windows
detection:
    selection_img:
        - Image|endswith: '\wget.exe'
        - OriginalFileName: 'wget.exe'
    selection_ip:
        CommandLine|re: '://[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'
    selection_http:
        CommandLine|contains: 'http'
    selection_flag:
        - CommandLine|re: '\s-O\s'
        - CommandLine|contains: '--output-document'
    selection_ext:
        CommandLine|endswith:
            # Note you can transform this into a "contains" to increase coverage but you would need to take care of some FP.
            - '.ps1'
            - ".ps1'"
            - '.ps1"'
            - '.dat'
            - ".dat'"
            - '.dat"'
            - '.msi'
            - ".msi'"
            - '.msi"'
            - '.bat'
            - ".bat'"
            - '.bat"'
            - '.exe'
            - ".exe'"
            - '.exe"'
            - '.vbs'
            - ".vbs'"
            - '.vbs"'
            - '.vbe'
            - ".vbe'"
            - '.vbe"'
            - '.hta'
            - ".hta'"
            - '.hta"'
            - '.dll'
            - ".dll'"
            - '.dll"'
            - '.psm1'
            - ".psm1'"
            - '.psm1"'
    condition: all of selection_*
falsepositives:
    - Unknown
level: high