heroui logo

Suspicious Powershell

Anvilogic Forge

View Source
Summary
This rule is designed to detect execution of PowerShell commands/scripts that are initiated by binaries other than the standard 'powershell.exe'. Such behavior is indicative of possible malicious activity, as it allows threat actors to leverage PowerShell's capabilities while obfuscating their activities. The logic implemented in Splunk utilizes endpoint data to identify events matching EventCode 4103, which signifies PowerShell execution events. The rule invokes two custom functions to gather relevant endpoint data and then applies a regex to extract the path of the initiating process. If the initiating process is not 'powershell.exe' or its ISE counterpart, it's flagged for closer examination. This is particularly relevant for detecting advanced persistent threats (APTs) known to utilize such techniques, including APT35, Charming Kitten, and TA576, with associated software like BATLoader and XWorm potentially being involved. The output presents detailed event information, organizing it by timestamp, host, user, and relevant process data, thereby enabling analysts to derive insights and identify suspicious activities effectively.
Categories
  • Endpoint
  • Windows
  • Linux
Data Sources
  • Process
  • Application Log
ATT&CK Techniques
  • T1059.001
Created: 2024-02-09