
Summary
The 'PowerShell Share Enumeration Script' rule detects instances where PowerShell scripts contain functions that are typically associated with enumerating Windows shares. This type of activity is often seen in attacks, particularly those orchestrated by ransomware groups, who look for sensitive data that can be encrypted or exfiltrated. The detection approach focuses on specific PowerShell function calls indicative of share enumeration, using queries on logs from the winlogbeat and PowerShell logging integrations. Effective use of this rule involves triage procedures to analyze execution patterns and investigate triggers for potential abuse of PowerShell capabilities, alongside established incident response measures. Preparation includes ensuring that PowerShell Script Block Logging is enabled, allowing for comprehensive logging and monitoring of potentially malicious scripts. The rule aims to mitigate risks by providing a framework for thorough investigation steps and necessary remediation actions.
Categories
- Endpoint
- Windows
Data Sources
- Script
- Logon Session
- Process
ATT&CK Techniques
- T1135
- T1059
- T1059.001
- T1106
- T1039
Created: 2022-08-17