heroui logo

Import PowerShell Modules From Suspicious Directories - ProcCreation

Sigma Rules

View Source
Summary
This rule is designed to detect potentially malicious PowerShell activity by monitoring script executions that import modules from suspicious directories. The focus is on commonly abused environment paths such as the Temp and AppData directories, as well as the Public directory, which are frequently used in attacks to execute unauthorized scripts. When a PowerShell command line contains 'Import-Module' with any of these specified paths, it may indicate the execution of malicious scripts, often as part of a larger attack vector. The rule captures a variety of command formats to ensure comprehensive coverage against evasion techniques.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1003.002
Created: 2023-01-10