
Summary
This detection rule is designed to identify potential tampering with the Antimalware Scan Interface (AMSI) through the use of PowerShell reflection. It utilizes PowerShell Script Block Logging (EventCode=4104) to capture PowerShell commands that reference `system.management.automation.amsi`, an indication that an attacker might be attempting to bypass this critical security feature. Bypassing AMSI can lead to unmitigated execution of malicious code, which raises the risk of system compromise and data exfiltration. The rule's implementation requires the configuration of PowerShell Script Block Logging across endpoints, enabling it to detect relevant suspicious activity in real-time. False positives may arise from legitimate third-party application behavior where AMSI is disabled, thus necessitating additional filtering steps to refine detection accuracy.
Categories
- Endpoint
Data Sources
- Pod
ATT&CK Techniques
- T1562
- T1059.001
- T1059
Created: 2024-11-13