heroui logo

Invoke-Obfuscation Via Stdin - PowerShell Module

Sigma Rules

View Source
Summary
This rule is designed to detect obfuscated PowerShell commands being executed via standard input (stdin) as part of potential threat activity related to defense evasion and execution tactics. The detection works by parsing the output of PowerShell scripts for specific patterns indicative of obfuscation techniques. In this case, the regex pattern looks for sequences that include the command 'set', which can often be involved in creating environment variables or other dynamic execution contexts, thus revealing attempts to hide or obscure the true nature of the executed PowerShell command. The rule captures instances of potentially malicious obfuscated PowerShell code by identifying the use of the 'set' command in conjunction with environment manipulations. False positives are acknowledged, but none are specified definitively at this time, resulting in a high-scoring detection condition.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Script
Created: 2020-10-12