action: global title: Alternate PowerShell Hosts id: 64e8e417-c19a-475a-8d19-98ea705394cc description: Detects alternate PowerShell hosts potentially bypassing detections looking for powershell.exe status: experimental date: 2019/08/11 modified: 2021/06/01 author: Roberto Rodriguez @Cyb3rWard0g references: - https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190815181010.html tags: - attack.execution - attack.t1059.001 - attack.t1086 # an old one falsepositives: - Programs using PowerShell directly without invocation of a dedicated interpreter - MSP Detection Searcher - Citrix ConfigSync.ps1 level: medium detection: filter: - ContextInfo: 'powershell.exe' - Message: 'powershell.exe' # Both fields contain key=value pairs where the key HostApplication is relevant but # can't be referred directly as event field. condition: selection and not filter --- logsource: product: windows service: powershell detection: selection: EventID: - 4103 ContextInfo: '*' --- logsource: product: windows service: powershell-classic detection: selection: EventID: - 400 ContextInfo: '*'