title: Malicious PowerShell Keywords id: f62176f3-8128-4faa-bf6c-83261322e5eb status: experimental description: Detects keywords from well-known PowerShell exploitation frameworks references: - https://adsecurity.org/?p=2921 tags: - attack.execution - attack.t1059.001 - attack.t1086 #an old one author: Sean Metcalf (source), Florian Roth (rule) date: 2017/03/05 modified: 2021/10/16 logsource: product: windows category: ps_script definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277' detection: Malicious: ScriptBlockText|contains: - 'AdjustTokenPrivileges' - 'IMAGE_NT_OPTIONAL_HDR64_MAGIC' - 'Microsoft.Win32.UnsafeNativeMethods' - 'ReadProcessMemory.Invoke' - 'SE_PRIVILEGE_ENABLED' - 'LSA_UNICODE_STRING' - 'MiniDumpWriteDump' - 'PAGE_EXECUTE_READ' - 'SECURITY_DELEGATION' - 'TOKEN_ADJUST_PRIVILEGES' - 'TOKEN_ALL_ACCESS' - 'TOKEN_ASSIGN_PRIMARY' - 'TOKEN_DUPLICATE' - 'TOKEN_ELEVATION' - 'TOKEN_IMPERSONATE' - 'TOKEN_INFORMATION_CLASS' - 'TOKEN_PRIVILEGES' - 'TOKEN_QUERY' - 'Metasploit' - 'Mimikatz' condition: Malicious falsepositives: - Penetration tests level: high