
Summary
The analytic rule detects the importation of Windows PowerShell Applocker policies via specific cmdlets such as 'Import-Module Applocker' and 'Set-AppLockerPolicy' that utilizes an XML policy. This detection method relies on PowerShell's Script Block Logging (EventCode 4104) to capture script block text that corresponds to these cmdlets. This tactic is significant because it may suggest an attempt to impose restrictive Applocker policies that could be exploited by malware like Azorult to evade antivirus controls. If the behavior is confirmed malicious, it may enable an attacker to bypass critical security mechanisms, leading to system compromises and continued persistence within the network.
Categories
- Endpoint
Data Sources
- Pod
- Script
ATT&CK Techniques
- T1059.001
- T1059
- T1562.001
- T1562
Created: 2024-11-13