Files
blue-team-tools/rules/windows/powershell/powershell_suspicious_invocation_specific.yml
T

63 lines
1.6 KiB
YAML
Raw Normal View History

2017-03-13 09:23:08 +01:00
title: Suspicious PowerShell Invocations - Specific
2019-11-12 23:12:27 +01:00
id: fce5f582-cc00-41e1-941a-c6fabf0fdb8c
2017-03-05 15:01:51 +01:00
status: experimental
description: Detects suspicious PowerShell invocation command parameters
tags:
- attack.execution
2020-06-16 14:46:08 -06:00
- attack.t1059.001
- attack.t1086 #an old one
2020-11-20 01:22:20 -03:00
author: Florian Roth (rule), Jonhnathan Ribeiro
date: 2017/03/05
2017-03-05 15:01:51 +01:00
logsource:
product: windows
service: powershell
2017-03-05 15:01:51 +01:00
detection:
2020-11-20 01:22:20 -03:00
convert_b64:
Message|contains|all:
- '-nop'
- ' -w '
- 'hidden'
- ' -c '
- '[Convert]::FromBase64String'
iex_selection:
Message|contains|all:
- ' -w '
- 'hidden'
- '-noni'
- '-nop'
- ' -c '
- 'iex'
- 'New-Object'
enc_selection:
Message|contains|all:
- ' -w '
- 'hidden'
- '-ep'
- 'bypass'
- '-Enc'
reg_selection:
Message|contains|all:
- 'powershell'
- 'reg'
- 'add'
- 'HKCU\software\microsoft\windows\currentversion\run'
webclient_selection:
Message|contains|all:
- 'bypass'
- '-noprofile'
- '-windowstyle'
- 'hidden'
- 'new-object'
- 'system.net.webclient'
- '.download'
iex_webclient:
Message|contains|all:
- 'iex'
- 'New-Object'
- 'Net.WebClient'
- '.Download'
condition: 1 of them
2017-03-05 15:01:51 +01:00
falsepositives:
- Penetration tests
level: high