heroui logo

Invoke-Obfuscation CLIP+ Launcher - Security

Sigma Rules

View Source
Summary
The rule detects obfuscated attempts to use the Clip.exe application to execute PowerShell commands, which can signify potential malicious activity related to attack techniques such as defense evasion and command execution. This detection is based on Windows Event ID 4697, which will log actions involving service file names that contain elements like 'cmd', '&&', or clipboard functions. The focus is on detecting specific patterns in service transactions indicative of obfuscation tactics used in the execution of commands through PowerShell. It acts as an alert for security teams to investigate possible unauthorized or suspicious uses of the clipboard service in a Windows environment, which can be exploited for exfiltration or lateral movement.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Logon Session
  • Application Log
Created: 2020-10-13