heroui logo

Windows PowerShell Process With Malicious String

Splunk Security Content

View Source
Summary
This detection rule identifies the execution of potentially malicious PowerShell commands by monitoring processes through the respective event logs and data models. It focuses on tracking commands issued to `powershell.exe`, which can indicate the use of known offensive toolkits that may be employed for credential theft, lateral movement, and persistence in a network environment. By leveraging information from sources such as Windows Event Logs and Sysmon, the rule employs search queries to extract relevant process information that matches known malicious patterns. Notably, this rule aims to highlight unauthorized access attempts, privilege escalation incidents, and the risk of information breaches, formulating a significant alert mechanism within cybersecurity operations.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Windows Registry
  • Windows Registry
ATT&CK Techniques
  • T1059
  • T1059.001
  • T1087.002
Created: 2024-12-19