Files
blue-team-tools/rules/windows/powershell/powershell_script/posh_ps_msxml_com.yml
T

33 lines
1.3 KiB
YAML
Raw Normal View History

2022-01-19 20:40:43 +01:00
title: Powershell MsXml COM Object
id: 78aa1347-1517-4454-9982-b338d6df8343
status: test
2022-01-19 20:40:43 +01:00
description: |
2022-07-11 14:11:53 +01:00
Adversaries may abuse PowerShell commands and scripts for execution.
PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell)
Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code
2022-01-19 20:40:43 +01:00
references:
2022-07-11 14:11:53 +01:00
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-7---powershell-msxml-com-object---with-prompt
- https://learn.microsoft.com/en-us/previous-versions/windows/desktop/ms766431(v=vs.85)
2022-05-19 21:09:47 +03:00
- https://www.trendmicro.com/en_id/research/22/e/uncovering-a-kingminer-botnet-attack-using-trend-micro-managed-x.html
2022-10-26 09:43:39 +02:00
author: frack113, MatilJ
date: 2022-01-19
modified: 2022-05-19
2022-10-26 09:43:39 +02:00
tags:
- attack.execution
- attack.t1059.001
2022-01-19 20:40:43 +01:00
logsource:
product: windows
category: ps_script
2023-01-04 17:49:32 +01:00
definition: 'Requirements: Script Block Logging must be enabled'
2022-01-19 20:40:43 +01:00
detection:
selection:
ScriptBlockText|contains|all:
2022-05-19 21:09:47 +03:00
- 'New-Object'
2022-01-19 20:40:43 +01:00
- '-ComObject'
2022-05-19 21:09:47 +03:00
- 'MsXml2.'
- 'XmlHttp'
2022-01-19 20:40:43 +01:00
condition: selection
falsepositives:
2022-07-11 14:11:53 +01:00
- Legitimate administrative script
2022-01-19 20:40:43 +01:00
level: medium