action: global title: Suspicious XOR Encoded PowerShell Command Line description: Detects suspicious powershell process which includes bxor command, alternatvide obfuscation method to b64 encoded commands. status: experimental author: Sami Ruohonen date: 2018/09/05 detection: selection: CommandLine: - '* -bxor*' condition: selection falsepositives: - unknown level: medium --- logsource: product: windows service: sysmon detection: selection: EventID: 1 --- logsource: product: windows service: security definition: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation' detection: selection: EventID: 4688