heroui logo

Potential PowerShell Console History Access Attempt via History File

Sigma Rules

View Source
Summary
This rule monitors and detects unauthorized attempts to access the PowerShell console history file, specifically 'ConsoleHost_history.txt', which is crucial for identifying any potential credential theft or reconnaissance activities. The history file can contain sensitive information, such as plaintext passwords that have been used in PowerShell commands. The detection is triggered when the command line includes references to the history file or commands that retrieve the path to the history file, helping to ensure any suspicious access can be flagged for further investigation. Given that legitimate access to this file may occur in normal operational scenarios, the rule indicates a medium level of alertness due to the possibility of false positives.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2025-04-03