Files
blue-team-tools/rules/windows/powershell/powershell_script/posh_ps_susp_windowstyle.yml
T

33 lines
1.1 KiB
YAML
Raw Normal View History

2021-10-20 13:57:24 +02:00
title: Suspicious PowerShell WindowStyle Option
id: 313fbb0a-a341-4682-848d-6d6f8c4fab7c
2022-12-27 12:29:10 +01:00
status: test
2022-10-26 09:43:39 +02:00
description: |
2022-12-27 12:29:10 +01:00
Adversaries may use hidden windows to conceal malicious activity from the plain sight of users.
In some cases, windows that would typically be displayed when an application carries out an operation can be hidden
2022-07-11 14:11:53 +01:00
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.003/T1564.003.md
author: frack113, Tim Shelton (fp AWS)
date: 2021-10-20
modified: 2023-01-03
2021-10-20 13:57:24 +02:00
tags:
- attack.defense-evasion
2021-10-20 13:57:24 +02:00
- attack.t1564.003
logsource:
product: windows
category: ps_script
2023-01-04 17:49:32 +01:00
definition: 'Requirements: Script Block Logging must be enabled'
2021-10-20 13:57:24 +02:00
detection:
selection:
ScriptBlockText|contains|all:
2021-10-20 13:57:24 +02:00
- 'powershell'
- 'WindowStyle'
- 'Hidden'
filter:
2023-01-04 00:43:40 +01:00
ScriptBlockText|contains|all:
- ':\Program Files\Amazon\WorkSpacesConfig\Scripts\'
- '$PSScriptRoot\Module\WorkspaceScriptModule\WorkspaceScriptModule'
condition: selection and not filter
2021-10-20 13:57:24 +02:00
falsepositives:
- Unknown
2022-07-11 14:11:53 +01:00
level: medium