
Summary
This rule detects potentially malicious PowerShell activity associated with executing COM objects through the `::GetTypeFromCLSID` method. The detection focuses on PowerShell scripts that contain the commands `::GetTypeFromCLSID(` and `.ShellExecute(`, which may indicate an attempt to leverage COM objects for unauthorized actions, often seen in scenarios of privilege escalation or persistence techniques employed by attackers. To function effectively, this rule requires that Script Block Logging is enabled on Windows systems, enabling the logging of all PowerShell executions and their parameters. Users should be cautious of false positives, particularly from legitimate PowerShell scripts that may utilize similar commands for benign purposes. This rule is particularly pertinent for environments that employ heavy PowerShell usage and necessitate monitoring for anomalous behavior.
Categories
- Windows
Data Sources
- Script
- Application Log
ATT&CK Techniques
- T1546.015
Created: 2022-04-02