
Summary
This detection rule identifies attempts to run obfuscated PowerShell commands through the use of the Windows Clip.exe utility. The rule specifically looks for instances where the command contains the 'clip' command followed by an echo statement. Attackers may obfuscate PowerShell commands to evade detection mechanisms, and the usage of Clip.exe in this context can be a tactic to manipulate or execute commands that may be logged or monitored in a less effective manner. The detection logic employs a regex pattern to match any PowerShell command that uses 'echo' followed by 'clip' and further related execution calls like invoking clipboard manipulation (e.g., 'Clipboard' or 'Invoke'). Such patterns are indicative of scripts attempting to execute malicious tasks while hiding their true intent, making them crucial to monitor in environments susceptible to scripted attacks. The rule is categorized under high severity due to the potential impact of successful obfuscation techniques on network security.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Process
Created: 2020-10-09