Files
blue-team-tools/rules/web/proxy_generic/proxy_ua_powershell.yml
T

24 lines
726 B
YAML
Raw Normal View History

2017-03-13 13:51:32 +01:00
title: Windows PowerShell User Agent
2019-11-12 23:12:27 +01:00
id: c8557060-9221-4448-8794-96320e6f3e74
2021-11-27 11:33:14 +01:00
status: test
2017-03-13 13:51:32 +01:00
description: Detects Windows PowerShell Web Access
2020-09-15 07:02:30 -06:00
references:
2022-10-25 10:08:58 +02:00
- https://msdn.microsoft.com/powershell/reference/5.1/microsoft.powershell.utility/Invoke-WebRequest
2023-02-01 11:14:59 +01:00
author: Florian Roth (Nextron Systems)
date: 2017-03-13
modified: 2021-11-27
2022-10-25 10:08:58 +02:00
tags:
- attack.defense-evasion
- attack.command-and-control
2022-10-25 10:08:58 +02:00
- attack.t1071.001
2017-03-13 13:51:32 +01:00
logsource:
2022-10-25 10:08:58 +02:00
category: proxy
2017-03-13 13:51:32 +01:00
detection:
2022-10-25 10:08:58 +02:00
selection:
c-useragent|contains: ' WindowsPowerShell/'
condition: selection
2017-03-13 13:51:32 +01:00
falsepositives:
2022-10-25 10:08:58 +02:00
- Administrative scripts that download files from the Internet
- Administrative scripts that retrieve certain website contents
2017-03-13 13:51:32 +01:00
level: medium