heroui logo

Suspicious Unblock-File

Sigma Rules

View Source
Summary
The rule detects the use of the PowerShell cmdlet `Unblock-File`, which is employed to remove the Zone.Identifier alternate data stream from files downloaded from the internet. This action is often part of an attacker's tactic to bypass security mechanisms that prevent the execution of potentially harmful scripts. The specific detection logic looks for occurrences of the `Unblock-File` cmdlet in PowerShell script blocks. The rule signifies a medium alert level due to the increased likelihood of the command being misused by malicious entities. Proper script block logging must be enabled for the rule to function effectively. Potential false positives include legitimate use of PowerShell scripts for unblocking files that have been downloaded for valid administrative purposes. This rule is part of broader detection strategies aligned with the MITRE ATT&CK framework, specifically under defense evasion techniques which highlight attempts by attackers to hide their activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Script
  • Process
  • Application Log
ATT&CK Techniques
  • T1553.005
Created: 2022-02-01