diff --git a/rules/windows/process_creation/win_powershell_frombase64string.yml b/rules/windows/process_creation/win_powershell_frombase64string.yml new file mode 100644 index 000000000..dc680596e --- /dev/null +++ b/rules/windows/process_creation/win_powershell_frombase64string.yml @@ -0,0 +1,21 @@ +title: FromBase64String Command Line +id: e32d4572-9826-4738-b651-95fa63747e8a +status: experimental +description: Detects suspicious FromBase64String expressions in command line arguments +references: + - https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639 +author: Florian Roth +date: 2020/01/29 +tags: + - attack.t1027 + - attack.defense_evasion +logsource: + category: process_creation + product: windows +detection: + selection: + CommandLine|contains: '::FromBase64String(' + condition: selection +falsepositives: + - Administrative script libraries +level: high