heroui logo

PowerShell Profile Modification

Sigma Rules

View Source
Summary
This detection rule is designed to identify any creation or modification of PowerShell profile files, which can be indicative of potentially malicious activities, including persistence mechanisms employed by threat actors. PowerShell profiles are scripts that run whenever PowerShell is launched, and as a result, a compromised profile can be leveraged to execute arbitrary commands or load malicious scripts automatically. The rule focuses on specific file paths associated with PowerShell profile files across various versions of PowerShell and Windows systems. The detection mechanism is straightforward, configuring the detection to trigger when these specific files are altered or created. Given that system administrators may legitimately modify PowerShell profiles, there is a provision for minimizing false positives by accounting for such legitimate activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2019-10-24