
Summary
The 'Any Powershell DownloadFile' detection rule identifies the invocation of PowerShell's 'DownloadFile' method, commonly exploited by malicious actors to download additional payloads onto Windows systems. The rule utilizes data from Endpoint Detection and Response (EDR) agents, focusing specifically on process execution logs, such as Sysmon EventID 1 and Windows Event Log Security 4688. This method is significant because it is a common technique in malware operations, allowing attackers to execute arbitrary commands or retrieve data, leading to potential unauthorized access or data exfiltration. Analysts are advised to investigate the source and destination of such downloads and review logs from the Antimalware Scan Interface (AMSI) or PowerShell itself for deeper context. Implementation of this detection necessitates appropriate log ingestion from the EDR, ensuring that it feeds into the standardized Splunk Technology Add-ons and the Splunk Common Information Model (CIM) for effective analysis across endpoints.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- WMI
- Cloud Storage
- Logon Session
- Sensor Health
- Command
- Process
ATT&CK Techniques
- T1059.001
- T1059
- T1105
Created: 2025-01-27