Files
blue-team-tools/rules/windows/powershell/powershell_wsman_com_provider_no_powershell.yml
T
Max Altgelt 6f05e33feb fix: Correct incorrect message / keyword usage
Correct a number of rules where message or keyword were incorrectly used
as field names in events (typically windows event logs). However, neither
field actually exists and as such these strings could never match.
2021-08-12 16:28:07 +02:00

29 lines
897 B
YAML

title: Suspicious Non PowerShell WSMAN COM Provider
id: df9a0e0e-fedb-4d6c-8668-d765dfc92aa7
description: Detects suspicious use of the WSMAN provider without PowerShell.exe as the host application.
status: experimental
date: 2020/06/24
modified: 2021/05/21
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
tags:
- attack.execution
- attack.t1059.001
- attack.lateral_movement
- attack.t1021.003
references:
- https://twitter.com/chadtilbury/status/1275851297770610688
- https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/
- https://github.com/bohops/WSMan-WinRM
logsource:
product: windows
service: powershell
detection:
selection:
- 'ProviderName=WSMan'
filter:
- 'HostApplication=*powershell'
condition: selection and not filter
falsepositives:
- Unknown
level: medium