heroui logo

Invoke-Obfuscation Obfuscated IEX Invocation - System

Sigma Rules

View Source
Summary
This detection rule identifies obfuscated PowerShell command invocations generated by the Invoke-Obfuscation framework, which is commonly used to evade security mechanisms. Specifically, it targets commands that involve the use of `IEX` (Invoke-Expression) to execute PowerShell scripts that are typically obfuscated to hide malicious activities. By matching on specific patterns within the system logs, the rule pinpoints instances where system services (Event ID 7045) are created with command lines that exhibit typical obfuscation techniques, such as concatenation and environment variable manipulations. This is crucial for detecting sophisticated attack methodologies that leverage PowerShell for malicious purposes.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Logon Session
  • Application Log
Created: 2019-11-08