
Summary
This detection rule aims to identify suspicious PowerShell commands that indicate the downloading of files from the internet, which could suggest malicious intent such as downloading malware. Specifically, it triggers on certain PowerShell methods commonly used to fetch remote files. The detection employs two main selection criteria: pinpointing commands that utilize the `Net.WebClient` class and monitoring for the presence of `DownloadFile` or `DownloadString` methods within the PowerShell command's data. If both selections are satisfied, the rule evaluates to true and raises an alert. This rule can help analysts detect unauthorized downloads that are often symptomatic of malicious activities within a Windows environment.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Command
Created: 2017-03-05