title: Suspicious PowerShell Invocation based on Parent Process status: experimental description: Detects suspicious powershell invocations from interpreters or unusual programs author: Florian Roth reference: https://www.carbonblack.com/2017/03/15/attackers-leverage-excel-powershell-dns-latest-non-malware-attack/ logsource: product: windows service: sysmon detection: selection: EventID: 1 ParentImage: - '*\wscript.exe' - '*\cscript.exe' Image: - '*\powershell.exe' falsepositives: CurrentDirectory: '*\Health Service State\*' condition: selection and not falsepositive falsepositives: - Microsoft Operations Manager (MOM) - Other scripts level: medium