Files
blue-team-tools/rules/windows/powershell/powershell_malicious_keywords.yml
T

46 lines
1.4 KiB
YAML
Raw Normal View History

2018-06-27 09:20:20 +02:00
title: Malicious PowerShell Keywords
2017-03-05 01:47:25 +01:00
status: experimental
2018-06-27 09:20:20 +02:00
description: Detects keywords from well-known PowerShell exploitation frameworks
references:
- https://adsecurity.org/?p=2921
tags:
- attack.execution
2018-09-26 11:44:12 +02:00
- attack.t1086
2017-03-05 01:47:25 +01:00
author: Sean Metcalf (source), Florian Roth (rule)
logsource:
product: windows
service: powershell
2017-03-05 01:47:25 +01:00
description: 'It is recommanded to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
detection:
keywords:
- AdjustTokenPrivileges
- IMAGE_NT_OPTIONAL_HDR64_MAGIC
- Management.Automation.RuntimeException
- Microsoft.Win32.UnsafeNativeMethods
- ReadProcessMemory.Invoke
- Runtime.InteropServices
- SE_PRIVILEGE_ENABLED
- System.Security.Cryptography
- System.Runtime.InteropServices
- LSA_UNICODE_STRING
- MiniDumpWriteDump
- PAGE_EXECUTE_READ
- Net.Sockets.SocketFlags
- Reflection.Assembly
- SECURITY_DELEGATION
- TOKEN_ADJUST_PRIVILEGES
- TOKEN_ALL_ACCESS
- TOKEN_ASSIGN_PRIMARY
- TOKEN_DUPLICATE
- TOKEN_ELEVATION
- TOKEN_IMPERSONATE
- TOKEN_INFORMATION_CLASS
- TOKEN_PRIVILEGES
- TOKEN_QUERY
- Metasploit
- Mimikatz
condition: keywords
falsepositives:
- Penetration tests
level: high