title: DInject PowerShell Cradle CommandLine Flags id: d78b5d61-187d-44b6-bf02-93486a80de5a status: experimental description: Detects the use of the Dinject PowerShell cradle based on the specific flags author: Florian Roth references: - https://github.com/snovvcrash/DInjector date: 2021/12/07 tags: - attack.defense_evasion - attack.t1055 logsource: category: process_creation product: windows detection: selection: CommandLine|contains: - ' /am51' - ' /password' condition: selection falsepositives: - Unlikely level: critical