Files
blue-team-tools/rules/windows/powershell/powershell_classic/powershell_renamed_powershell.yml
T

29 lines
783 B
YAML
Raw Normal View History

2021-08-18 13:56:14 +02:00
title: Renamed Powershell Under Powershell Channel
2021-07-04 19:44:50 +02:00
id: 30a8cb77-8eb3-4cfb-8e79-ad457c5a4592
description: Detects renamed powershell
2021-08-18 13:56:14 +02:00
status: test
2021-07-04 19:44:50 +02:00
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
author: Harish Segar, frack113
date: 2020/06/29
2021-10-16 08:26:51 +02:00
modified: 2021/10/16
2021-07-04 19:44:50 +02:00
tags:
- attack.execution
2021-08-22 13:57:56 +02:00
- attack.t1086 # an old one
- attack.t1059.001
2021-07-04 19:44:50 +02:00
logsource:
product: windows
2021-10-16 08:26:51 +02:00
category: ps_classic_start
2021-08-16 12:56:24 +02:00
definition: fields have to be extract from event
2021-07-04 19:44:50 +02:00
detection:
selection:
2021-08-18 13:56:14 +02:00
HostName: ConsoleHost
2021-07-04 19:44:50 +02:00
filter:
HostApplication|startswith:
2021-08-18 13:56:14 +02:00
- powershell.exe
- C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
2021-07-04 19:44:50 +02:00
condition: selection and not filter
falsepositives:
- unknown
2021-08-22 13:57:56 +02:00
level: low