
Summary
This detection rule focuses on identifying suspicious PowerShell commands that utilize the System.Net.WebClient class to download files or strings from the internet. The rule specifically targets the `.DownloadFile()` and `.DownloadString()` methods, which, while often legitimate, can also be exploited by attackers to fetch malicious content from remote servers. This rule is designed to trigger alerts when such functions are invoked within PowerShell, helping security teams identify potential indicators of compromise (IoCs) related to threat execution tactics, particularly in the context of file and code downloads from untrusted or unknown sources. Given its comprehensive detection conditions, it helps mitigate the risk of executing unauthorized or harmful scripts that may lead to further exploitation of the system. The rule is particularly relevant for environments running Windows where PowerShell is frequently used for legitimate administrative tasks but is also targeted for abuse by threat actors.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
Created: 2017-03-05