Files
blue-team-tools/rules/windows/powershell/powershell_exe_calling_ps.yml
T

31 lines
828 B
YAML
Raw Normal View History

2020-01-30 17:26:09 +01:00
title: PowerShell Called from an Executable Version Mismatch
2019-11-12 23:12:27 +01:00
id: c70e019b-1479-4b65-b0cc-cd0c6093a599
2017-03-05 01:47:25 +01:00
status: experimental
description: Detects PowerShell called from an executable by the version mismatch method
references:
- https://adsecurity.org/?p=2921
tags:
- attack.defense_evasion
- attack.execution
2020-06-16 14:46:08 -06:00
- attack.t1059.001
- attack.t1086 # an old one
2017-03-05 01:47:25 +01:00
author: Sean Metcalf (source), Florian Roth (rule)
date: 2017/03/05
2017-03-05 01:47:25 +01:00
logsource:
product: windows
2017-03-22 11:17:03 +01:00
service: powershell-classic
2021-08-16 12:56:24 +02:00
definition: fields have to be extract from event
2017-03-05 01:47:25 +01:00
detection:
2017-03-05 14:14:31 +01:00
selection1:
2017-03-05 01:47:25 +01:00
EventID: 400
2020-10-15 17:09:47 -03:00
EngineVersion|startswith:
- '2.'
- '4.'
- '5.'
HostVersion|startswith: '3.'
2017-03-05 14:14:31 +01:00
condition: selection1
2017-03-05 01:47:25 +01:00
falsepositives:
2017-03-22 11:17:03 +01:00
- Penetration Tests
- Unknown
2017-03-05 01:47:25 +01:00
level: high