
Summary
The detection rule 'Net WebClient Casing Anomalies' is designed to identify potentially malicious PowerShell commands exhibiting unusual casing patterns in the string 'Net.WebClient', which is commonly used in obfuscation scenarios. Obfuscation techniques often manipulate casing to evade detection by security solutions. The rule monitors process creations, specifically focusing on PowerShell executions, looking for specific command line patterns that match encoded strings associated with abnormal casing. The encoded strings represent decoded PowerShell commands that could lead to security incidents. This rule highlights the significance of monitoring abnormal casing as an indicator of suspicious activity within Windows environments.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Command
Created: 2022-05-24