
Summary
The analytic detects suspicious usage of the `GetProcAddress` function within PowerShell script blocks, specifically through the analysis of PowerShell Script Block Logging, which records event code 4104. This method captures the complete PowerShell command and logs it into Windows event logs. The occurrence of `GetProcAddress` in PowerShell indicates a deviation from typical script behavior and is often leveraged by threat actors to execute arbitrary code, potentially leading to system compromise. Analysts are advised to examine concurrent processes and the full context of the logged script block for signs of malicious activity.
Categories
- Endpoint
Data Sources
- Pod
- Application Log
ATT&CK Techniques
- T1059
- T1055
- T1059.001
Created: 2024-11-13