2022-06-21 11:47:18 +01:00
|
|
|
title: PowerShell Hotfix Enumeration
|
2022-06-21 15:46:00 +01:00
|
|
|
id: f5d1def8-1de0-4a0e-9794-1f6f27dd605c
|
2023-10-17 14:35:26 +02:00
|
|
|
status: test
|
2022-06-21 11:47:18 +01:00
|
|
|
description: Detects call to "Win32_QuickFixEngineering" in order to enumerate installed hotfixes often used in "enum" scripts by attackers
|
|
|
|
|
references:
|
2022-07-11 14:11:53 +01:00
|
|
|
- https://github.com/411Hall/JAWS/blob/233f142fcb1488172aa74228a666f6b3c5c48f1d/jaws-enum.ps1
|
2023-02-01 11:14:59 +01:00
|
|
|
author: Nasreddine Bencherchali (Nextron Systems)
|
2024-08-12 12:02:50 +02:00
|
|
|
date: 2022-06-21
|
2022-10-26 09:43:39 +02:00
|
|
|
tags:
|
|
|
|
|
- attack.discovery
|
2022-06-21 11:47:18 +01:00
|
|
|
logsource:
|
|
|
|
|
product: windows
|
|
|
|
|
category: ps_script
|
2023-01-04 17:49:32 +01:00
|
|
|
definition: 'Requirements: Script Block Logging must be enabled'
|
2022-06-21 11:47:18 +01:00
|
|
|
detection:
|
|
|
|
|
selection:
|
|
|
|
|
ScriptBlockText|contains|all:
|
|
|
|
|
- 'Win32_QuickFixEngineering'
|
|
|
|
|
- 'HotFixID'
|
|
|
|
|
condition: selection
|
|
|
|
|
falsepositives:
|
|
|
|
|
- Legitimate administration scripts
|
|
|
|
|
level: medium
|