Files
blue-team-tools/rules/windows/powershell/powershell_remote_powershell_session.yml
T
2021-09-02 21:16:55 +02:00

45 lines
1.3 KiB
YAML
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
action: global
title: Remote PowerShell Session
description: Detects remote PowerShell sessions
status: test
date: 2019/08/10
modified: 2020/08/24
author: Roberto Rodriguez @Cyb3rWard0g
references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190511223310.html
tags:
- attack.execution
- attack.t1059.001
- attack.t1086 # an old one
- attack.lateral_movement
- attack.t1021.006
- attack.t1028 # an old one
falsepositives:
- Legitimate use remote PowerShell sessions
level: high
---
id: 96b9f619-aa91-478f-bacb-c3e50f8df575
logsource:
product: windows
service: powershell
definition: Module Logging must be enable and fields have to be extract from event
detection:
selection:
EventID: 4103
ContextInfo|contains|all:
- ' = ServerRemoteHost ' # HostName: 'ServerRemoteHost' french : Nom dhôte =
- 'wsmprovhost.exe' # HostApplication|contains: 'wsmprovhost.exe' french Application hôte =
condition: selection
---
id: 60167e5c-84b2-4c95-a7ac-86281f27c445
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection:
EventID: 400
HostName: 'ServerRemoteHost'
HostApplication|contains: 'wsmprovhost.exe'
condition: selection