Files
blue-team-tools/rules/windows/powershell/powershell_cmdline_specific_comb_methods.yml
T

53 lines
1.5 KiB
YAML

title: Suspicious PowerShell Cmdline
id: b6b49cd1-34d6-4ead-b1bf-176e8edba9a5
description: Detects specific combinations of methods in the PowerShell command lines
status: experimental
references:
- https://2019.offzone.moscow/ru/report/hunting-for-powershell-abuses/
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=65
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
author: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community
date: 2020/10/11
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith: '\powershell.exe'
selection2:
CommandLine|contains|all:
- 'char'
- 'joint'
selection3:
CommandLine|contains:
- 'ToInt'
- 'ToDecimal'
- 'ToByte'
- 'ToByte'
- 'ToSingle'
- 'ToSByte'
selection4:
CommandLine|contains:
- 'ToChar'
- 'ToString'
- 'String'
selection5:
CommandLine|contains|all:
- 'split'
- 'join'
selection6:
CommandLine|contains|all:
- 'ForEach'
- 'Xor'
selection7:
CommandLine|contains:
- 'cOnvErTTO-SECUreStRIng'
condition: selection1 and (selection2 or (selection3 and selection4) or selection5 or selection6 or selection7)
falsepositives:
- Unlikely
level: high