heroui logo

Potential PowerShell HackTool Script by Function Names

Elastic Detection Rules

View Source
Summary
The detection rule titled 'Potential PowerShell HackTool Script by Function Names' is designed to identify the presence of known PowerShell offensive functions commonly utilized by threat actors in malicious scripts. The rule leverages event logs from Windows PowerShell, focusing on specific function calls indicative of potential hacking tools without modifications often used by attackers. By tracking these function names, the rule aims to detect unauthorized or malicious use of PowerShell, a primary administration and automation tool that can be exploited for execution of harmful scripts. The rule suggests analyzing scripts that trigger alerts, focusing on suspicious activity patterns including DLL imports, execution context (user privileges), and alerts related to processes working with those scripts. A holistic approach is encouraged; combining script analysis with monitoring DNS cache entries and examining service configurations on affected systems. The rule is part of a broader strategy to enhance incident response through proactive threat detection based on established MITRE ATT&CK tactics.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • File
  • Scheduled Job
  • Network Traffic
ATT&CK Techniques
  • T1059
  • T1059.001
Created: 2023-01-17