heroui logo

Potential Persistence Via PowerShell User Profile Using Add-Content

Sigma Rules

View Source
Summary
This rule detects modifications made to the user profile in Windows through the PowerShell command `Add-Content`, often used by attackers to achieve persistence. The command adds content to files or scripts that can be executed in the user's PowerShell session, which may include malicious payloads or commands. The detection is specifically looking for `Add-Content $profile`, indicating an attempt to alter the user profile in a suspicious manner. Accompanying this, the rule checks for known malicious patterns such as `Invoke-Expression`, which are frequently used in exploitation techniques. The requirement for Script Block Logging implies that the environment must have this feature enabled to capture the necessary data for effective analysis. False positives may arise from legitimate administrative scripts that enhance PowerShell functionalities. Regular monitoring for these actions is crucial in preventing unauthorized persistence efforts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Script
ATT&CK Techniques
  • T1546.013
Created: 2021-08-18