
Summary
The SQL Client Tools PowerShell Session Detection rule is designed to identify potentially malicious use of the sqltoolsps.exe utility, which is part of the Microsoft SQL Server Management Studio suite. This utility allows users to execute PowerShell commands, but it does not log script blocks, enabling attackers to bypass standard logging protections. The detection criteria are focused on identifying instances where sqltoolsps.exe is executed as a process or as a child process originating from smss.exe. The rule is structured to filter out legitimate executions stemming from smss.exe, as these are deemed a normal operation in typical environments. By capturing instances of unauthorized PowerShell command execution via sqltoolsps.exe, the rule addresses a specific tactic employed by threat actors to execute commands stealthily, leveraging Microsoft tools that may be overlooked by conventional security monitoring systems.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2020-10-13