title: Execution via CL_Invocation.ps1 id: 4cd29327-685a-460e-9dac-c3ab96e549dc description: Detects Execution via SyncInvoke in CL_Invocation.ps1 module status: experimental author: oscd.community, Natalia Shornikova date: 2020/10/14 references: - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSScripts/Cl_invocation.yml - https://twitter.com/bohops/status/948061991012327424 tags: - attack.defense_evasion - attack.t1216 logsource: product: windows service: powershell detection: selection: EventID: 4104 ScriptBlockText|contains|all: - 'CL_Invocation.ps1' - 'SyncInvoke' selection2: EventID: 4104 ScriptBlockText|contains: - 'CL_Invocation.ps1' - 'SyncInvoke' timeframe: 1m condition: - selection - selection2 | count(ScriptBlockText) by Computer > 2 # PS > Import-Module c:\Windows\diagnostics\system\Audio\CL_Invocation.ps1; SyncInvoke c:\Evil.exe # or # PS > Import-Module c:\Windows\diagnostics\system\Audio\CL_Invocation.ps1 # PS > SyncInvoke c:\Evil.exe falsepositives: Unknown level: high