Files
blue-team-tools/rules/windows/powershell/powershell_script/powershell_azurehound_commands.yml
T
phantinuss b6d4e39538 feat: check for the existence of a description field
it is not mandatory in the sigma standard but
mandatory for this repository
2022-01-12 12:55:49 +01:00

31 lines
913 B
YAML

title: AzureHound PowerShell Commands
id: 83083ac6-1816-4e76-97d7-59af9a9ae46e
status: experimental
description: Detects the execution of AzureHound in PowerShell, a tool to gather data from Azure for BloodHound
references:
- https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/AzureHound.ps1
- https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html
author: Austin Songer (@austinsonger)
date: 2021/10/23
modified: 2022/01/12
logsource:
product: windows
category: ps_script
definition: Script Block Logging must be enabled
detection:
selection:
ScriptBlockText|contains: Invoke-AzureHound
condition: selection
tags:
- attack.discovery
- attack.t1482
- attack.t1087
- attack.t1087.001
- attack.t1087.002
- attack.t1069.001
- attack.t1069.002
- attack.t1069
falsepositives:
- Penetration testing
level: high