diff --git a/rules/windows/process_creation/win_pc_embed_exe_lnk.yml b/rules/windows/process_creation/win_pc_embed_exe_lnk.yml new file mode 100644 index 000000000..4bb47f3f8 --- /dev/null +++ b/rules/windows/process_creation/win_pc_embed_exe_lnk.yml @@ -0,0 +1,25 @@ +title: Hide a Powershell Script In a Link File +id: 30e92f50-bb5a-4884-98b5-d20aa80f3d7a +status: experimental +description: This is created when a user click on a lnk file with a powershell hide into it +author: frack113 +date: 2022/02/06 +references: + - https://www.x86matthew.com/view_post?id=embed_exe_lnk +logsource: + category: process_creation + product: windows +detection: + selection: + ParentImage: C:\Windows\explorer.exe + Image: C:\Windows\System32\cmd.exe + CommandLine|contains|all: + - 'powershell' + - '.lnk' + condition: selection +falsepositives: + - unknown +level: medium +tags: + - attack.execution + - attack.t1059.001 \ No newline at end of file