2022-04-06 16:37:04 +02:00
|
|
|
title: Accessing WinAPI in PowerShell. Code Injection
|
2020-10-06 20:52:18 +03:00
|
|
|
id: eeb2e3dc-c1f4-40dd-9bd5-149ee465ad50
|
2021-11-27 11:33:14 +01:00
|
|
|
status: test
|
2022-08-12 13:42:52 +01:00
|
|
|
description: Detects the creation of a remote thread from a Powershell process to another process
|
2020-10-07 14:50:00 +03:00
|
|
|
author: Nikita Nazarov, oscd.community
|
2020-10-06 20:52:18 +03:00
|
|
|
references:
|
2022-07-07 20:13:45 +01:00
|
|
|
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
|
2021-11-27 11:33:14 +01:00
|
|
|
date: 2020/10/06
|
2022-08-12 13:42:52 +01:00
|
|
|
modified: 2022/08/12
|
2020-10-06 20:52:18 +03:00
|
|
|
logsource:
|
2022-07-07 20:13:45 +01:00
|
|
|
product: windows
|
|
|
|
|
category: create_remote_thread
|
|
|
|
|
definition: 'Note that you have to configure logging for CreateRemoteThread in Symson config'
|
2020-10-06 20:52:18 +03:00
|
|
|
detection:
|
2022-07-07 20:13:45 +01:00
|
|
|
selection:
|
2022-07-14 17:35:50 +01:00
|
|
|
SourceImage|endswith:
|
|
|
|
|
- '\powershell.exe'
|
|
|
|
|
- '\pwsh.exe'
|
2022-07-28 16:58:24 +02:00
|
|
|
filter_powershell:
|
|
|
|
|
SourceParentImage: 'C:\Windows\System32\CompatTelRunner.exe'
|
|
|
|
|
condition: selection and not 1 of filter*
|
2020-10-06 20:52:18 +03:00
|
|
|
falsepositives:
|
2022-07-07 20:13:45 +01:00
|
|
|
- Unknown
|
2020-10-06 20:52:18 +03:00
|
|
|
level: high
|
2021-11-27 11:33:14 +01:00
|
|
|
tags:
|
2022-07-07 20:13:45 +01:00
|
|
|
- attack.execution
|
|
|
|
|
- attack.t1059.001
|