
Summary
This detection rule focuses on identifying the invocation of Windows API calls through PowerShell scripts, which can indicate potential malicious behavior, such as process manipulation, code injection, or privilege escalation. The rule targets specific API functions commonly associated with these threat vectors. Key WinAPI functions monitored include 'VirtualAlloc', 'OpenProcess', 'WriteProcessMemory', and 'CreateRemoteThread' for script-based injection scenarios, as well as 'OpenProcessToken', 'LookupPrivilegeValue', and 'AdjustTokenPrivileges' for detecting token manipulation attempts. When PowerShell scripts are instantiated that contain any of these function calls, the detection condition is triggered, marking a potential security risk. Notably, Script Block Logging must be enabled on the Windows system for this rule to operate effectively. There exists a high potential for false positives, primarily due to the legitimate use of these functions in administrative scripts.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Process
Created: 2020-10-06