2022-01-19 20:40:43 +01:00
title : Powershell MsXml COM Object
id : 78aa1347-1517-4454-9982-b338d6df8343
2023-10-17 14:35:26 +02:00
status : test
2022-01-19 20:40:43 +01:00
description : |
2022-07-11 14:11:53 +01:00
Adversaries may abuse PowerShell commands and scripts for execution.
PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell)
Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code
2022-01-19 20:40:43 +01:00
references :
2022-07-11 14:11:53 +01:00
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.001/T1059.001.md#atomic-test-7---powershell-msxml-com-object---with-prompt
2024-07-02 06:00:11 -04:00
- https://learn.microsoft.com/en-us/previous-versions/windows/desktop/ms766431(v=vs.85)
2022-05-19 21:09:47 +03:00
- https://www.trendmicro.com/en_id/research/22/e/uncovering-a-kingminer-botnet-attack-using-trend-micro-managed-x.html
2022-10-26 09:43:39 +02:00
author : frack113, MatilJ
2024-08-12 12:02:50 +02:00
date : 2022-01-19
modified : 2022-05-19
2022-10-26 09:43:39 +02:00
tags :
- attack.execution
- attack.t1059.001
2022-01-19 20:40:43 +01:00
logsource :
product : windows
category : ps_script
2023-01-04 17:49:32 +01:00
definition: 'Requirements : Script Block Logging must be enabled'
2022-01-19 20:40:43 +01:00
detection :
selection :
ScriptBlockText|contains|all :
2022-05-19 21:09:47 +03:00
- 'New-Object'
2022-01-19 20:40:43 +01:00
- '-ComObject'
2022-05-19 21:09:47 +03:00
- 'MsXml2.'
- 'XmlHttp'
2022-01-19 20:40:43 +01:00
condition : selection
falsepositives :
2022-07-11 14:11:53 +01:00
- Legitimate administrative script
2022-01-19 20:40:43 +01:00
level : medium