
Summary
This detection rule focuses on identifying potentially malicious PowerShell processes that employ obfuscation techniques in their command-line arguments. It utilizes logs obtained from Endpoint Detection and Response (EDR) agents to analyze specific process behaviors, including process names, parent processes, and full command-line executions. Obfuscation is a common tactic used by attackers to disguise the intent of their scripts, making it harder for security defenses to recognize malicious actions. The rule calculates an obfuscation score based on the presence of specific characters in the command line, triggering detections when the score exceeds a defined threshold, thereby improving the ability to recognize attacks that seek to evade detection. If this activity is confirmed as malicious, it can lead to serious risks including unauthorized code execution and persistent threat presence on the systems.
Categories
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1059
- T1059.001
Created: 2024-11-13