2022-01-19 20:40:43 +01:00
title : Powershell XML Execute Command
id : 6c6c6282-7671-4fe9-a0ce-a2dcebdc342b
2023-12-01 12:50:36 +01:00
status : test
2022-01-19 20:40:43 +01:00
description : |
2022-10-26 09:43:39 +02:00
Adversaries may abuse PowerShell commands and scripts for execution.
PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell)
Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code
2022-01-19 20:40:43 +01:00
references :
2022-07-07 19:13:01 +01:00
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-8---powershell-xml-requests
2022-10-26 09:43:39 +02:00
author : frack113
2024-08-12 12:02:50 +02:00
date : 2022-01-19
modified : 2023-01-19
2022-10-26 09:43:39 +02:00
tags :
- attack.execution
- attack.t1059.001
2022-01-19 20:40:43 +01:00
logsource :
product : windows
category : ps_script
2023-01-04 17:49:32 +01:00
definition: 'Requirements : Script Block Logging must be enabled'
2022-01-19 20:40:43 +01:00
detection :
selection_xml :
ScriptBlockText|contains|all :
2023-01-02 14:49:45 +01:00
- 'New-Object'
- 'System.Xml.XmlDocument'
- '.Load'
2022-01-19 20:40:43 +01:00
selection_exec :
2023-01-02 14:49:45 +01:00
ScriptBlockText|contains :
- 'IEX '
- 'Invoke-Expression '
2023-01-19 16:37:10 +01:00
- 'Invoke-Command '
- 'ICM -'
2022-01-19 20:40:43 +01:00
condition : all of selection_*
falsepositives :
2022-07-07 19:13:01 +01:00
- Legitimate administrative script
2022-01-19 20:40:43 +01:00
level : medium