heroui logo

Powershell Install a DLL in System Directory

Sigma Rules

View Source
Summary
This detection rule focuses on monitoring PowerShell activities that attempt to install or copy files directly into critical system directories, specifically 'System32' or 'SysWOW64'. Such actions are often associated with malicious activities, where attackers try to place DLLs in system directories to ensure they can be executed with higher system privileges or to avoid detection. The rule leverages Script Block Logging to identify suspicious PowerShell commands using the 'Copy-Item' (or its alias 'cpi') command that targets these directories. The detection condition is triggered when the regex pattern matches any ScriptBlockText indicating a file copy operation that fits the specified criteria. As such actions could lead to credential theft or the installation of malicious components that masquerade as benign system files, this rule serves as an essential alert for security teams to investigate further.
Categories
  • Windows
Data Sources
  • Script
  • Process
ATT&CK Techniques
  • T1556.002
Created: 2021-12-27