heroui logo

Remote File Download via PowerShell

Elastic Detection Rules

View Source
Summary
The rule identifies the use of PowerShell to download executable files from untrusted external sources, which is a common method employed by attackers to import tools or malware into an environment. This behavior is detected by correlating network and file creation events specific to processes executed by PowerShell. The detection logic utilizes an EQL query that tracks sequences of network activity and file creation events, ensuring that the downloaded files are executable scripts or applications, while filtering out benign traffic to trusted domains and legitimate uses of PowerShell. The rule aids in pinpointing potential command and control activity by observing the networking patterns and the types of files being downloaded, enabling further investigation of the involved processes and user actions. This is particularly critical as attackers often leverage PowerShell for both automation and malicious activities, thus necessitating vigilant monitoring of its usage.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Network Traffic
  • File
ATT&CK Techniques
  • T1105
  • T1059
  • T1059.001
Created: 2020-11-30