
Remote Process Instantiation via WinRM and PowerShell Script Block
Splunk Security Content
View SourceSummary
This detection rule identifies instances of remote process initiation on endpoints using PowerShell commands via the WinRM protocol, particularly focusing on the `Invoke-Command` cmdlet in conjunction with PowerShell Script Block Logging (EventCode=4104). The analysis targets suspicious executions of PowerShell that may signify potential lateral movement or remote code execution attempts by adversaries. Successful exploitation could enable an attacker to execute arbitrary code on remote systems within a network, creating significant security risks such as further compromise or persistent threats. The detection leverages the specific patterns in the ScriptBlockText of PowerShell, monitoring the command being executed and the target computer specified in parameters, which can be indicative of malicious activities if common usage is not observed.
Categories
- Windows
- Endpoint
Data Sources
- Pod
- File
ATT&CK Techniques
- T1021
- T1021.006
Created: 2024-11-13