Files
sigma-rules/rta/powershell_from_script.py
T
2022-09-08 12:50:39 -04:00

51 lines
1.4 KiB
Python

# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
# or more contributor license agreements. Licensed under the Elastic License
# 2.0; you may not use this file except in compliance with the Elastic License
# 2.0.
# Name: PowerShell Launched from Script
# RTA: powershell_from_script.py
# signal.rule.name: Windows Script Executing PowerShell
# ATT&CK: T1064, T1192, T1193
# Description: Creates a javascript file that will launch powershell.
import os
import time
from . import common
from . import RtaMetadata
metadata = RtaMetadata(
uuid="161c5972-6bfe-47b5-92bd-e0399e025dec",
platforms=["windows"],
endpoint=[],
siem=[{"rule_id": "f545ff26-3c94-4fd0-bd33-3c7f95a3a0fc", "rule_name": "Windows Script Executing PowerShell"}],
techniques=["T1566"],
)
@common.requires_os(metadata.platforms)
def main():
# Write script
script_file = os.path.abspath("launchpowershell.vbs")
script = """Set objShell = CreateObject("Wscript.shell")
objShell.run("powershell echo 'Doing evil things...'; sleep 3")
"""
with open(script_file, "w") as f:
f.write(script)
# Execute script
for proc in ["wscript", "cscript"]:
common.execute([proc, script_file])
time.sleep(3)
# Clean up
common.remove_file(script_file)
return common.SUCCESS
if __name__ == "__main__":
exit(main())