2022-12-23 12:34:56 +01:00
title : Suspicious FromBase64String Usage On Gzip Archive - Ps Script
2022-12-23 11:10:17 +01:00
id : df69cb1d-b891-4cd9-90c7-d617d90100ce
related :
- id : d75d6b6b-adb9-48f7-824b-ac2e786efe1f
type : similar
2023-11-02 10:48:45 +01:00
status : test
2022-12-23 12:34:56 +01:00
description : Detects attempts of decoding a base64 Gzip archive in a PowerShell script. This technique is often used as a method to load malicious content into memory afterward.
2022-12-23 11:10:17 +01:00
references :
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=43
author : frack113
2024-08-12 12:02:50 +02:00
date : 2022-12-23
2023-08-28 10:53:27 -04:00
tags :
2024-08-12 12:02:50 +02:00
- attack.command-and-control
2023-08-28 10:53:27 -04:00
- attack.t1132.001
2022-12-23 11:10:17 +01:00
logsource :
product : windows
category : ps_script
2023-01-04 17:49:32 +01:00
definition: 'Requirements : Script Block Logging must be enabled'
2022-12-23 11:10:17 +01:00
detection :
selection :
ScriptBlockText|contains|all :
- 'FromBase64String'
2022-12-23 12:34:56 +01:00
- 'MemoryStream'
2022-12-23 11:10:17 +01:00
- 'H4sI'
condition : selection
falsepositives :
- Legitimate administrative script
level : medium