2022-01-19 20:40:43 +01:00
title : Powershell MsXml COM Object
id : 78aa1347-1517-4454-9982-b338d6df8343
status : experimental
description : |
Adversaries may abuse PowerShell commands and scripts for execution.
PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell)
Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code
2022-05-19 21:09:47 +03:00
author : frack113, MatilJ
2022-01-19 20:40:43 +01:00
date : 2022 /01/19
2022-05-19 21:09:47 +03:00
modified : 2022 /05/19
2022-01-19 20:40:43 +01:00
references :
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1059.001/T1059.001.md#atomic-test-7---powershell-msxml-com-object---with-prompt
- https://docs.microsoft.com/en-us/previous-versions/windows/desktop/ms766431(v=vs.85)
2022-05-19 21:09:47 +03:00
- https://www.trendmicro.com/en_id/research/22/e/uncovering-a-kingminer-botnet-attack-using-trend-micro-managed-x.html
2022-01-19 20:40:43 +01:00
logsource :
product : windows
category : ps_script
detection :
selection :
ScriptBlockText|contains|all :
2022-05-19 21:09:47 +03:00
- 'New-Object'
2022-01-19 20:40:43 +01:00
- '-ComObject'
2022-05-19 21:09:47 +03:00
- 'MsXml2.'
- 'XmlHttp'
2022-01-19 20:40:43 +01:00
condition : selection
falsepositives :
2022-03-16 14:35:19 +01:00
- Legitimate administrative script
2022-01-19 20:40:43 +01:00
level : medium
tags :
- attack.execution
- attack.t1059.001