Files
blue-team-tools/rules/windows/process_creation/win_powershell_xor_commandline.yml
T

28 lines
768 B
YAML
Raw Normal View History

title: Suspicious XOR Encoded PowerShell Command Line
2019-11-12 23:12:27 +01:00
id: bb780e0c-16cf-4383-8383-1e5471db6cf9
2020-06-29 22:18:25 +02:00
description: Detects suspicious powershell process which includes bxor command, alternative obfuscation method to b64 encoded commands.
status: experimental
2020-06-29 22:13:49 +02:00
author: Sami Ruohonen, Harish Segar (improvement)
date: 2018/09/05
2020-06-29 22:13:49 +02:00
modified: 2020/06/29
tags:
- attack.execution
- attack.t1086
2020-06-16 14:46:08 -06:00
- attack.t1059.001
2020-06-29 22:13:49 +02:00
logsource:
category: process_creation
product: windows
detection:
2019-03-02 00:14:20 +01:00
selection:
2020-06-29 22:13:49 +02:00
- Description: "Windows PowerShell"
- Product: "PowerShell Core 6"
filter:
CommandLine|contains:
- "bxor"
- "join"
- "char"
condition: selection and filter
falsepositives:
2019-03-02 00:14:20 +01:00
- unknown
level: medium