heroui logo

Malicious PowerShell Commandlets - PoshModule

Sigma Rules

View Source
Summary
The detection rule identifies potentially malicious PowerShell commandlets commonly associated with exploitation frameworks. This is crucial as attackers frequently utilize PowerShell to execute various types of commands that can facilitate unauthorized access, privilege escalation, or data exfiltration. The rule is designed to alert on the presence of specific keywords found in PowerShell module payloads indicative of nefarious activity. The list includes commandlets associated with persistence, data exfiltration, account manipulation, and reconnaissance techniques often employed in advanced persistent threat (APT) scenarios. This detection rule leverages well-documented commandlets and frameworks utilized by threat actors, thus providing a generally high-fidelity alerting mechanism. By monitoring for these commandlets, security teams can improve their chances of detecting active exploitation attempts before they lead to more severe breaches.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Logon Session
Created: 2023-01-20