Files
blue-team-tools/rules/windows/powershell/powershell_clear_powershell_history.yml
T

52 lines
1.6 KiB
YAML
Raw Normal View History

2019-10-29 03:44:22 +03:00
title: Clear PowerShell History
2019-12-19 23:56:36 +01:00
id: dfba4ce1-e0ea-495f-986e-97140f31af2d
2019-10-29 03:44:22 +03:00
status: experimental
description: Detects keywords that could indicate clearing PowerShell history
date: 2019/10/25
modified: 2020/11/28
author: Ilyas Ochkov, Jonhnathan Ribeiro, Daniil Yugoslavskiy, oscd.community
2019-10-29 03:44:22 +03:00
references:
- https://gist.github.com/hook-s3c/7363a856c3cdbadeb71085147f042c1a
tags:
- attack.defense_evasion
- attack.t1070.003
- attack.t1146 # an old one
2019-10-29 03:44:22 +03:00
logsource:
product: windows
service: powershell
definition: 4104 Script block logging must be enabled , 4103 Module Logging must be enabled
2019-10-29 03:44:22 +03:00
detection:
selection_1:
EventID: 4104
selection_2:
ScriptBlockText|contains:
2020-11-26 22:46:17 -03:00
- 'del'
- 'Remove-Item'
- 'rm'
ScriptBlockText|contains|all:
- '(Get-PSReadlineOption).HistorySavePath'
selection_3:
ScriptBlockText|contains|all:
2020-11-26 22:46:17 -03:00
- 'Set-PSReadlineOption'
- 'HistorySaveStyle'
- 'SaveNothing'
selection_4:
EventID: 4103
selection_5:
Payload|contains:
- 'del'
2020-11-26 22:46:17 -03:00
- 'Remove-Item'
- 'rm'
Payload|contains|all:
2020-11-26 22:46:17 -03:00
- '(Get-PSReadlineOption).HistorySavePath'
selection_6:
Payload|contains|all:
- 'Set-PSReadlineOption'
- 'HistorySaveStyle'
- 'SaveNothing'
condition: selection_1 and ( selection_2 or selection_3 ) or
selection_4 and ( selection_5 or selection_6 )
2019-10-29 03:44:22 +03:00
falsepositives:
- Legitimate PowerShell scripts
2019-10-29 03:44:22 +03:00
level: medium