
Summary
This detection rule identifies obfuscated PowerShell commands initiated through VAR++ LAUNCHER, which are often used in evasion tactics by threat actors. The rule leverages PowerShell's ability to execute script blocks and detects patterns indicative of obfuscation techniques where the script's true intent is concealed. Specifically, the detection focuses on the use of 'set' coupled with specific characters and options, creating recognizable signatures of obfuscated command execution. Organizations are advised to ensure that Script Block Logging is enabled in PowerShell to facilitate this detection. The rule is applicable to Windows environments and aims to enhance defense against potential exploitation that employs obfuscated PowerShell scripting.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Process
Created: 2020-10-13