
Summary
This detection rule aims to identify obfuscated PowerShell commands executed through the VAR++ LAUNCHER on Windows systems. It specifically looks for the Event ID 4697, which records the creation of a new service. The rule uses conditions that check if the `ServiceFileName` contains specific patterns indicative of obfuscation techniques, such as command-line arguments that may be used to hide execution intentions. Common elements in the obfuscated commands include `cmd`, `&&set`, and various placeholders ranging from `{0}` to `{5}`. If any of these conditions match, an alert is generated, denoting a high-level potential attack targeting the defense evasion aspect of cybersecurity. This rule is crucial as obfuscation methods are often employed by attackers to bypass security mechanisms, making it important to monitor for such behavior.
Categories
- Windows
- Endpoint
Data Sources
- Service
- Logon Session
Created: 2020-10-13