heroui logo

Detected Windows Software Discovery - PowerShell

Sigma Rules

View Source
Summary
This detection rule identifies when adversaries attempt to enumerate installed software on Windows systems using PowerShell. This behavior is often indicative of reconnaissance efforts, where the attacker seeks to gather information about the software environment. The rule is designed to trigger alerts when specific PowerShell commands, such as 'get-itemProperty', are used in conjunction with paths that typically reference the software registry, specifically '\software\'. This tactic can help malign actors to assess installed security tools and identify potential vulnerabilities in software versions. It is crucial for environment security to monitor such activities, as legitimate administrative operations may also use similar commands but under normal circumstances would not raise a flag if properly monitored. Therefore, the rule can be fine-tuned for significance based on the context of the environment where it is deployed.
Categories
  • Windows
  • Endpoint
Data Sources
  • Script
  • Windows Registry
ATT&CK Techniques
  • T1518
Created: 2020-10-16