heroui logo

PowerShell Download and Execution Cradles

Sigma Rules

View Source
Summary
The rule detects potentially malicious PowerShell commands that utilize download and execution cradles. Specifically, it identifies two key patterns in command line executions. The first pattern checks for download commands, which include methods like DownloadString, DownloadFile, and Invoke-WebRequest, indicating that a script or payload is being fetched from an external source. The second pattern looks for command executions using Invoke-Expression (iex), which can execute arbitrary code downloaded from the internet. The condition requires that both patterns be present in a single command execution to trigger an alert. This type of behavior is often associated with attack techniques aiming to execute malware by first downloading it via PowerShell, making it crucial for endpoint detection and response (EDR) systems to monitor these actions closely. The rule may generate false positives, particularly from legitimate PowerShell scripts and installers that coincide with the defined patterns, thus calling for careful application of filters.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-03-24