Files
blue-team-tools/rules/windows/powershell/powershell_script/posh_ps_susp_windowstyle.yml
T

26 lines
889 B
YAML
Raw Normal View History

2021-10-20 13:57:24 +02:00
title: Suspicious PowerShell WindowStyle Option
id: 313fbb0a-a341-4682-848d-6d6f8c4fab7c
status: experimental
description: Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden
2022-07-11 14:11:53 +01:00
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.003/T1564.003.md
2021-10-20 13:57:24 +02:00
tags:
- attack.defense_evasion
- attack.t1564.003
author: frack113
date: 2021/10/20
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
2021-10-20 13:57:24 +02:00
detection:
selection:
ScriptBlockText|contains|all:
2021-10-20 13:57:24 +02:00
- 'powershell'
- 'WindowStyle'
- 'Hidden'
condition: selection
falsepositives:
- Unknown
2022-07-11 14:11:53 +01:00
level: medium