
Summary
This detection rule focuses on identifying obfuscated PowerShell commands that utilize the Windows `Clip.exe` utility, which is often employed in malicious activities to manipulate or exfiltrate data via the clipboard. The rule specifically captures PowerShell commands that incorporate the `echo` functionality followed by a call to `clip`, indicating a potential attempt to obfuscate the execution of commands and outputs. The regex pattern used for detection looks for commands with `echo` followed by `clip`, making it effective in detecting script-based attacks attempting to disguise their behavior through the `Clip.exe` usage. This rule is particularly relevant for threat hunting and monitoring environments for potentially malicious PowerShell execution involving clipboard manipulation, and it addresses attack techniques associated with defense evasion.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Process
Created: 2020-10-09