heroui logo

Invoke-Obfuscation CLIP+ Launcher - System

Sigma Rules

View Source
Summary
This detection rule is focused on identifying obfuscated usage of Clip.exe, which is utilized to manage the Windows clipboard. The main concern with such usage is its potential to serve as a vector for executing PowerShell scripts in a stealthy manner, therefore aiding malicious actors in evading detection. It specifically monitors for system-level events where the Service Control Manager (SCM) logs indicate the inclusion of typical obfuscation syntax in the ImagePath of service creation events. In this context, the rule captures the creation of services that reference command execution patterns like 'cmd', '&&', and the usage of clipboard methods in a PowerShell context, which are predominant indicators of malicious activity. This rule is categorized under high level due to the significant threat posed by evasion techniques that exploit the clipboard functionality.
Categories
  • Windows
  • Endpoint
Data Sources
  • Service
  • Process
Created: 2020-10-13