Merge PR #5534 from @swachchhanda000 - update PowerShell WebRequest rules
remove: PowerShell Web Download - deprecate duplicate rule in favour of 9fc51a3c-81b3-4fa7-b35f-7c02cf10fd2d update: PowerShell Script With File Upload Capabilities - add invoke-restmethod cmdlet update: Change User Agents with WebRequest - add invoke-restmethod cmdlet update: Usage Of Web Request Commands And Cmdlets - add invoke-restmethod cmdlet update: Usage Of Web Request Commands And Cmdlets - ScriptBlock - add invoke-restmethod cmdlet update: Potential DLL File Download Via PowerShell Invoke-WebRequest - add invoke-restmethod cmdlet update: PowerShell Download and Execution Cradles - add invoke-restmethod cmdlet update: Suspicious Invoke-WebRequest Execution With DirectIP - add invoke-restmethod cmdlet update: Suspicious Invoke-WebRequest Execution - add powershell_ise update: Potential Data Exfiltration Activity Via CommandLine Tools - add invoke-restmethod cmdlet update: Obfuscated IP Download Activity - add invoke-restmethod cmdlet update: Suspicious PowerShell In Registry Run Keys - add invoke-restmethod cmdlet --------- Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
af492dc0f6
commit
1e41c5378e
+9
-3
@@ -8,7 +8,7 @@ references:
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-webrequest?view=powershell-7.4
|
||||
author: frack113
|
||||
date: 2022-01-07
|
||||
modified: 2023-05-04
|
||||
modified: 2025-07-18
|
||||
tags:
|
||||
- attack.exfiltration
|
||||
- attack.t1020
|
||||
@@ -19,12 +19,18 @@ logsource:
|
||||
detection:
|
||||
selection_cmdlet:
|
||||
ScriptBlockText|contains:
|
||||
- 'Invoke-RestMethod'
|
||||
- 'Invoke-WebRequest'
|
||||
- 'irm '
|
||||
- 'iwr '
|
||||
selection_flag:
|
||||
ScriptBlockText|contains:
|
||||
- '-Method Put'
|
||||
- '-Method Post'
|
||||
- '-Method "POST"'
|
||||
- '-Method "PUT"'
|
||||
- '-Method POST'
|
||||
- '-Method PUT'
|
||||
- "-Method 'POST'"
|
||||
- "-Method 'PUT'"
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
+9
-5
@@ -8,7 +8,7 @@ references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1071.001/T1071.001.md#t1071001---web-protocols
|
||||
author: frack113
|
||||
date: 2022-01-23
|
||||
modified: 2023-01-02
|
||||
modified: 2025-07-18
|
||||
tags:
|
||||
- attack.command-and-control
|
||||
- attack.t1071.001
|
||||
@@ -17,11 +17,15 @@ logsource:
|
||||
category: ps_script
|
||||
definition: 'Requirements: Script Block Logging must be enabled'
|
||||
detection:
|
||||
selection:
|
||||
ScriptBlockText|contains|all:
|
||||
selection_webrequest:
|
||||
ScriptBlockText|contains:
|
||||
- 'Invoke-WebRequest'
|
||||
- '-UserAgent '
|
||||
condition: selection
|
||||
- 'Invoke-RestMethod'
|
||||
- ' irm ' # Space before and after to avoid false positives with 'irm' as a variable
|
||||
- 'iwr '
|
||||
selection_useragent:
|
||||
ScriptBlockText|contains: '-UserAgent '
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
|
||||
@@ -10,7 +10,7 @@ references:
|
||||
- https://blog.jourdant.me/post/3-ways-to-download-files-with-powershell
|
||||
author: James Pemberton / @4A616D6573
|
||||
date: 2019-10-24
|
||||
modified: 2023-01-10
|
||||
modified: 2025-07-18
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
@@ -25,6 +25,7 @@ detection:
|
||||
- 'curl '
|
||||
- 'Invoke-RestMethod'
|
||||
- 'Invoke-WebRequest'
|
||||
- ' irm ' # Space before and after to avoid false positives with 'irm' as a substring
|
||||
- 'iwr '
|
||||
- 'Net.WebClient'
|
||||
- 'Resume-BitsTransfer'
|
||||
|
||||
Reference in New Issue
Block a user