2021-07-03 20:48:03 +08:00
title : Data Compressed - PowerShell
2019-11-12 23:12:27 +01:00
id : 6dc5d284-69ea-42cf-9311-fb1c3932a69a
2019-11-12 23:05:36 +01:00
status : experimental
2021-07-03 20:48:03 +08:00
description : An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.
2019-11-12 23:05:36 +01:00
author : Timur Zinniatullin, oscd.community
date : 2019 /10/21
2021-10-16 08:18:49 +02:00
modified : 2021 /10/16
2019-11-12 23:05:36 +01:00
references :
2021-07-04 08:15:29 +08:00
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560/T1560.md
2019-11-12 23:05:36 +01:00
logsource :
product : windows
2021-10-16 08:18:49 +02:00
category : ps_script
2021-08-21 09:58:58 +02:00
definition : Script block logging must be enabled
2019-11-12 23:05:36 +01:00
detection :
selection :
2021-07-06 20:36:38 +08:00
ScriptBlockText|contains|all :
2019-11-12 23:05:36 +01:00
- '-Recurse'
- '|'
- 'Compress-Archive'
condition : selection
falsepositives :
2021-07-03 20:48:03 +08:00
- Highly likely if archive operations are done via PowerShell.
2019-11-12 23:05:36 +01:00
level : low
tags :
- attack.exfiltration
2020-06-16 14:46:08 -06:00
- attack.t1560
2020-08-24 00:01:50 +00:00
- attack.t1002 # an old one