heroui logo

Windows PowerShell Script From WindowsApps Directory

Splunk Security Content

View Source
Summary
This detection rule identifies the execution of PowerShell scripts from the WindowsApps directory, which is increasingly employed by attackers utilizing malicious MSIX packages. This specific technique targets processes initiated via embedded PowerShell scripts, notably StartingScriptWrapper.ps1, to execute harmful code. The rule relies on telemetry gathered from Endpoint Detection and Response (EDR) agents, focusing particularly on command lines and parent process paths associated with PowerShell executions. The significance of this detection lies in the capability of such actions to enable adversaries to execute arbitrary code, maintain persistence, or deploy malware without triggering conventional security defenses. The rule aggregates data from sources such as Sysmon EventID 1 and Windows Event Log Security 4688 to provide comprehensive monitoring of potential threats originating from the WindowsApps directory, a known resource for legitimate applications but also for exploitation by malicious actors.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1059
  • T1059.001
  • T1204.002
Created: 2025-08-05