2020-06-10 16:32:30 +02:00
title : In-memory PowerShell
id : 092bc4b9-3d1d-43b4-a6b4-8c8acd83522f
status : experimental
description : Detects loading of essential DLL used by PowerShell, but not by the process powershell.exe. Detects meterpreter's "load powershell" extension.
2020-10-18 01:16:11 +03:00
author : Tom Kern, oscd.community, Natalia Shornikova
2020-06-10 16:32:30 +02:00
date : 2019 /11/14
2020-10-12 19:05:08 +03:00
modified : 2020 /10/12
2020-06-10 16:32:30 +02:00
references :
- https://adsecurity.org/?p=2921
- https://github.com/p3nt4/PowerShdll
tags :
2020-08-25 01:09:17 +02:00
- attack.t1086 # an old one
2020-07-18 02:50:57 +01:00
- attack.t1059.001
2020-06-10 16:32:30 +02:00
- attack.execution
logsource :
2020-06-24 17:41:21 +02:00
category : image_load
2020-06-10 16:32:30 +02:00
product : windows
detection :
selection :
ImageLoaded|endswith :
- '\System.Management.Automation.Dll'
- '\System.Management.Automation.ni.Dll'
filter :
Image|endswith :
- '\powershell.exe'
- '\powershell_ise.exe'
- '\WINDOWS\System32\sdiagnhost.exe'
2020-07-09 10:26:54 -04:00
- '\mscorsvw.exe' # c:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsw.exe for instance
2020-09-06 09:25:56 -04:00
- '\WINDOWS\System32\RemoteFXvGPUDisablement.exe' # on win10
2020-10-12 19:05:08 +03:00
- '\sqlps.exe'
- '\wsmprovhost.exe'
- '\winrshost.exe'
- '\syncappvpublishingserver.exe'
- '\runscripthelper.exe'
- '\ServerManager.exe'
2020-06-10 16:32:30 +02:00
# User: 'NT AUTHORITY\SYSTEM' # if set, matches all powershell processes not launched by SYSTEM
condition : selection and not filter
falsepositives :
- Used by some .NET binaries, minimal on user workstation.
level : high
enrichment :
- EN_0001_cache_sysmon_event_id_1_info # http://bit.ly/314zc6x
- EN_0003_enrich_other_sysmon_events_with_event_id_1_data # http://bit.ly/2ojW7fw