
Summary
This detection rule is designed to identify suspicious PowerShell command patterns that are often indicative of malicious activity, particularly in the context of downloading and executing scripts. The rule targets common PowerShell commands associated with the exploitation techniques where an attacker can leverage PowerShell to fetch and execute scripts remotely. Specifically, it watches for the use of 'IEX (New-Object Net.WebClient).DownloadString' and similar variants which reflect attempts to execute downloaded content directly, a tactic frequently used in malware deployment, including stagers and downloaders. The rule employs a case-insensitive matching approach to effectively capture these commands regardless of how they are formatted in the command line. Understanding and blocking these patterns can significantly enhance endpoint security by intercepting early-stage malware execution attempts before they can establish a foothold on the system.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-02-28