Files
blue-team-tools/rules/windows/process_creation/win_powershell_xor_commandline.yml
T
2022-01-06 14:02:35 +01:00

33 lines
888 B
YAML

title: Suspicious XOR Encoded PowerShell Command Line
id: bb780e0c-16cf-4383-8383-1e5471db6cf9
status: test
description: Detects suspicious powershell process which includes bxor command, alternative obfuscation method to b64 encoded commands.
author: Sami Ruohonen, Harish Segar (improvement)
date: 2018/09/05
modified: 2021/11/27
logsource:
category: process_creation
product: windows
detection:
selection:
- Description: 'Windows PowerShell'
- Product: 'PowerShell Core 6'
filter:
CommandLine|contains:
- 'bxor'
- 'join'
- 'char'
false_positives:
ParentImage:
- C:\Program Files\Amazon\SSM\ssm-document-worker.exe
condition: selection and filter and not false_positives
falsepositives:
- unknown
level: medium
tags:
- attack.defense_evasion
- attack.t1086 # an old one
- attack.t1059.001
- attack.t1140
- attack.t1027