
Summary
The detection rule identifies suspicious PowerShell activities by utilizing PowerShell Script Block Logging (specifically EventCode=4104). This mechanism captures complete command executions within PowerShell, enabling the identification of various offensive toolkits and commands that are indicative of malicious behavior, such as credential theft, lateral movement, and persistence techniques. The detection works by matching logged ScriptBlockText against a repository of known malicious PowerShell strings. If matched, this indicates potential unauthorized access, privilege escalation, or compromise of sensitive data, warranting further investigation. Users should ensure that the relevant operational logs are collected and that the macro for PowerShell is appropriately configured to ensure accurate detection.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
ATT&CK Techniques
- T1059
- T1059.001
- T1552.006
Created: 2024-12-19