Files
blue-team-tools/rules/windows/powershell/powershell_xor_commandline.yml
T

30 lines
776 B
YAML
Raw Normal View History

2018-10-18 16:20:51 +02:00
action: global
2018-12-05 05:51:41 +03:00
title: Suspicious XOR Encoded PowerShell Command Line
2018-09-05 09:21:15 +02:00
description: Detects suspicious powershell process which includes bxor command, alternatvide obfuscation method to b64 encoded commands.
status: experimental
author: Sami Ruohonen
date: 2018/09/05
detection:
selection:
CommandLine:
- '* -bxor*'
condition: selection
falsepositives:
- unknown
level: medium
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
---
logsource:
product: windows
service: security
definition: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
2018-09-05 09:21:15 +02:00
detection:
selection:
EventID: 4688