Files
blue-team-tools/rules/windows/builtin/win_powershell_script_installed_as_service.yml
T
2021-11-30 15:03:53 +01:00

27 lines
691 B
YAML

title: PowerShell Scripts Installed as Services
id: a2e5019d-a658-4c6a-92bf-7197b54e2cae
description: Detects powershell script installed as a Service
status: experimental
author: oscd.community, Natalia Shornikova
date: 2020/10/06
modified: 2021/11/30
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
tags:
- attack.execution
- attack.t1569.002
logsource:
product: windows
service: system
detection:
service_creation:
Provider_Name: 'Service Control Manager'
EventID: 7045
ImagePath|contains:
- 'powershell'
- 'pwsh'
condition: service_creation
falsepositives:
- Unknown
level: high