heroui logo

Launch-VsDevShell.PS1 Proxy Execution

Sigma Rules

View Source
Summary
This detection rule identifies the execution of the 'Launch-VsDevShell.ps1' script, which is a signed Microsoft PowerShell script commonly used for executing commands in a development environment. The rule focuses on the process creation events on Windows systems, specifically looking for instances where the command line contains the script name. There are two selection criteria for detecting the intended use of this script where the command line must include 'Launch-VsDevShell.ps1' along with parameters like 'VsWherePath' or 'VsInstallationPath'. This combination indicates that the script is being used as an attack vector for executing hidden commands under the guise of legitimate developer operations. False positives may arise from normal usage by developers, thus a medium level of alertness is flagged due to the potential for misuse in defense evasion tactics.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-08-19