heroui logo

Incoming Execution via PowerShell Remoting

Elastic Detection Rules

View Source
Summary
This detection rule identifies potential remote execution activities performed via Windows PowerShell remoting, which could indicate lateral movement within an organizational network. PowerShell remoting allows users to execute PowerShell commands on remote machines, presenting both legitimate administrative uses and potential opportunities for malicious actors. The rule employs a sequence query that captures network traffic directed towards specific ports (5985 and 5986) typically associated with PowerShell remoting and correlates this with process executions initiated by the legitimate host process 'wsmprovhost.exe'. A flagged alert prompts actions to verify whether the remote execution was conducted by authorized personnel or if it reflects a compromise by unauthorized actors. False positives may arise from legitimate administrative tasks, necessitating careful baseline establishment of regular usage patterns. The rule differentiates between benign and malicious activity based on contextual analysis of the events leading up to the detection, ensuring that operational noise is kept to a minimum while maintaining security posture.
Categories
  • Endpoint
  • Windows
  • Cloud
Data Sources
  • Windows Registry
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1021
  • T1021.006
  • T1059
  • T1059.001
Created: 2020-11-24