heroui logo

Potential PowerShell Pass-the-Hash/Relay Script

Elastic Detection Rules

View Source
Summary
The rule detects potential PowerShell scripts that facilitate pass-the-hash (PtH) and man-in-the-middle (MitM) attacks by analyzing PowerShell script block logs for suspicious patterns indicative of credential interception and NTLM challenge relay. The detection is designed for Windows environments, specifically targeting unusual NTLM authentication activities and hex sequences associated with these attacks. The rule is triggered by events containing specific keywords and hex values that suggest the execution of potentially malicious PowerShell scripts. It requires enabling PowerShell Script Block Logging to gather the necessary data for effective monitoring and alerting.
Categories
  • Endpoint
  • Windows
  • Cloud
  • Infrastructure
Data Sources
  • Windows Registry
  • Script
  • Process
  • Application Log
  • Network Traffic
  • User Account
ATT&CK Techniques
  • T1557
  • T1059
  • T1059.001
  • T1550
  • T1550.002
Created: 2024-03-27