Skip to content

Commit d72e38c

Browse files
peterdj45CI Botzoomequipd
authored
Add detection rule for CMD file attachments (#3894)
Co-authored-by: CI Bot <hello@sublimesecurity.com> Co-authored-by: Brandon Murphy <4827852+zoomequipd@users.noreply.github.com>
1 parent 7dc7b92 commit d72e38c

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: "Attachment: cmd file extension"
2+
description: "Detects messages containing CMD (Command Prompt) batch files, either as direct attachments or within compressed archives. CMD files can execute arbitrary system commands and are commonly used to deliver malware or perform unauthorized system modifications."
3+
type: "rule"
4+
severity: "low"
5+
source: |
6+
type.inbound
7+
and length(attachments) > 0
8+
and any(attachments,
9+
.file_extension =~ "cmd"
10+
or (
11+
.file_extension in~ $file_extensions_common_archives
12+
and any(file.explode(.), .file_extension =~ "cmd")
13+
)
14+
)
15+
16+
tags:
17+
- "Attack surface reduction"
18+
attack_types:
19+
- "Malware/Ransomware"
20+
tactics_and_techniques:
21+
- "Scripting"
22+
detection_methods:
23+
- "Archive analysis"
24+
- "File analysis"
25+
id: "a902b8ed-b8ef-5232-b6bd-0fe915e6a161"

0 commit comments

Comments
 (0)