
Summary
This rule is designed to detect potentially malicious PowerShell script executions by monitoring Event Code 4104, which captures execution details of PowerShell scripts. The rule specifically looks for script blocks that include multiple URLs, which may indicate the usage of obfuscated scripts or attempts to download malicious payloads. Such activities are particularly alarming as they may be part of an attacker's operation to execute unauthorized code or exfiltrate sensitive data. The detection utilizes PowerShell operational logs, correlating URLs found within the scripts to identify suspicious behavior. Upon discovery, it is crucial to review related processes and the entire script block for additional context to ascertain the legitimacy of the activity and to understand any wider implications of the detected event.
Categories
- Endpoint
Data Sources
- Pod
- Process
- Application Log
- Command
ATT&CK Techniques
- T1059
- T1059.001
- T1105
Created: 2024-11-13