heroui logo

Potential Suspicious Windows Feature Enabled - ProcCreation

Sigma Rules

View Source
Summary
This rule is designed to detect potentially suspicious usage of the built-in PowerShell cmdlet "Enable-WindowsOptionalFeature" which is part of the Deployment Image Servicing and Management (DISM) tools on Windows systems. This cmdlet allows users to enumerate, install, uninstall, configure, and update features and packages in Windows images, serving as a powerful tool for system management. However, its misuse may indicate suspicious activity, particularly in contexts of defense evasion, where an attacker might enable certain features to establish backdoor access or manipulate the system for malicious purposes. The rule specifically looks for command line invocations that include "Enable-WindowsOptionalFeature" with the "-Online" and "-FeatureName" parameters, alongside efforts to enable potentially harmful features such as TelnetServer, Internet-Explorer-Optional-amd64, TFTP, SMB1Protocol, Client-ProjFS, and Microsoft-Windows-Subsystem-Linux. By flagging these actions, the rule aims to provide an early warning mechanism for system administrators to investigate potentially harmful changes made to Windows systems, thereby enhancing the security posture of the Windows environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2022-12-29