2021-05-20 17:03:32 +02:00
title : Remote PowerShell Session Host Process (WinRM)
2019-12-19 23:56:36 +01:00
id : 734f8d9b-42b8-41b2-bcf5-abaf49d5a3c8
2021-07-15 11:20:25 +08:00
description : Detects remote PowerShell sections by monitoring for wsmprovhost (WinRM host process) as a parent or child process (sign of an active PowerShell remote session).
2019-10-24 15:48:38 +02:00
status : experimental
date : 2019 /09/12
2021-05-21 09:29:11 +02:00
modified : 2021 /05/21
2019-10-24 15:48:38 +02:00
author : Roberto Rodriguez @Cyb3rWard0g
references :
2021-05-22 01:04:53 -03:00
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190511223310.html
2020-01-11 00:33:50 +01:00
tags :
- attack.execution
2020-09-07 02:00:41 +04:00
- attack.t1086 # an old one
2020-06-16 14:46:08 -06:00
- attack.t1059.001
2021-07-15 11:20:25 +08:00
- attack.t1021.006
2019-10-24 15:48:38 +02:00
logsource :
2019-11-10 23:10:24 +03:00
category : process_creation
2019-10-24 15:48:38 +02:00
product : windows
detection :
2019-11-10 23:10:24 +03:00
selection :
- Image|endswith : '\wsmprovhost.exe'
- ParentImage|endswith : '\wsmprovhost.exe'
condition : selection
2020-01-11 00:11:27 +01:00
fields :
- ComputerName
- User
- CommandLine
2019-10-24 15:48:38 +02:00
falsepositives :
2021-07-15 11:20:25 +08:00
- Legitimate usage of remote Powershell, e.g. for monitoring purposes.
2020-03-17 20:40:28 +01:00
level : medium