Files
blue-team-tools/rules/windows/powershell/powershell_xor_commandline.yml
T
Lurkkeli 30fc4bd030 powershell xor commandline
New rule to detect -bxor usage in a powershell commandline.
2018-09-05 09:21:15 +02:00

29 lines
758 B
YAML

title: Suspicious Encoded PowerShell Command Line
description: Detects suspicious powershell process which includes bxor command, alternatvide obfuscation method to b64 encoded commands.
status: experimental
author: Sami Ruohonen
date: 2018/09/05
detection:
selection:
CommandLine:
- '* -bxor*'
condition: selection
falsepositives:
- unknown
level: medium
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
---
logsource:
product: windows
service: security
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
detection:
selection:
EventID: 4688