
Summary
This analytic detection rule is designed to capture and flag instances of PowerShell processes that utilize the EncodedCommand parameter, frequently a tactic used by adversaries to obscure command execution. By focusing on EDR data sources, including Sysmon and Windows Event Logs, the detection aims to identify not only standard usages of EncodedCommand but also its variations and alternative invocation forms that could indicate malicious intent. The encrypted or encoded commands are challenging to detect using conventional methods, as they disguise the actual commands being executed. The implementation requires careful analysis of parallel event logs to validate any detections, as legitimate use cases can exist, primarily by system administrators. It is critical to fine-tune the detection logic to minimize false positives while maintaining robust capturing and reporting capabilities for any potential threats related to encoded PowerShell commands that could facilitate unauthorized actions, privilege escalation, or persistent threats within environments.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
- Image
- Application Log
ATT&CK Techniques
- T1059.001
- T1027
Created: 2024-11-22