Files
sigma-rules/rta/powershell_from_script.py
T

49 lines
1.4 KiB
Python
Raw Normal View History

2020-06-29 23:07:16 -06:00
# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
2021-03-03 22:12:11 -09:00
# or more contributor license agreements. Licensed under the Elastic License
# 2.0; you may not use this file except in compliance with the Elastic License
# 2.0.
2020-06-29 23:07:16 -06:00
# Name: PowerShell Launched from Script
# RTA: powershell_from_script.py
# signal.rule.name: Windows Script Executing PowerShell
2020-06-29 23:07:16 -06:00
# ATT&CK: T1064, T1192, T1193
# Description: Creates a javascript file that will launch powershell.
import time
from pathlib import Path
2020-06-29 23:07:16 -06:00
from . import RtaMetadata, common
2020-06-29 23:07:16 -06:00
2022-09-08 12:50:39 -04:00
metadata = RtaMetadata(
uuid="161c5972-6bfe-47b5-92bd-e0399e025dec",
platforms=["windows"],
endpoint=[],
siem=[{"rule_id": "f545ff26-3c94-4fd0-bd33-3c7f95a3a0fc", "rule_name": "Windows Script Executing PowerShell"}],
techniques=["T1566"],
)
2023-10-03 10:47:58 -04:00
@common.requires_os(*metadata.platforms)
2020-06-29 23:07:16 -06:00
def main():
# Write script
script_file = Path("launchpowershell.vbs").resolve()
2020-06-29 23:07:16 -06:00
script = """Set objShell = CreateObject("Wscript.shell")
objShell.run("powershell echo 'Doing evil things...'; sleep 3")
"""
2022-09-08 12:50:39 -04:00
with open(script_file, "w") as f:
2020-06-29 23:07:16 -06:00
f.write(script)
# Execute script
for proc in ["wscript", "cscript"]:
common.execute([proc, script_file])
time.sleep(3)
# Clean up
common.remove_file(script_file)
return common.SUCCESS
if __name__ == "__main__":
exit(main())