heroui logo

Suspicious Get-Variable.exe Creation

Sigma Rules

View Source
Summary
The rule titled 'Suspicious Get-Variable.exe Creation' is designed to detect potentially malicious creations of an executable named Get-Variable.exe, which mimics a legitimate PowerShell cmdlet. The detection focuses on the execution of files located in a path typical for Windows applications, specifically the 'Local\Microsoft\WindowsApps' directory. The rule operates under the premise that a malicious actor could leverage the PowerShell Get-Variable cmdlet as a means to execute arbitrary code by creating an executable that masks itself under this common name, thus avoiding detection mechanisms that rely on spotting unusual binary behavior. There is a high likelihood of this behavior being indicative of persistence techniques often employed by attackers, hence the high severity level assigned to the rule. This detection rule triggers when a file with the name Get-Variable.exe is created or executed in this specific directory, leading to potential alerts for further investigation.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2022-04-23