
Summary
This detection rule aims to identify potential misuse of the Perl interpreter on Windows systems, specifically looking for instances where Perl is executed with the "-e" or "-E" command-line flags. Such flags allow users to run Perl scripts directly from the command line, which can facilitate executing arbitrary code, potentially leading to unauthorized actions such as establishing reverse shells, a common tactic used by attackers to maintain remote access to compromised systems. The detection leverages process creation logs to track the invocation of 'perl.exe' and checks whether the command line of the executed process includes these specific flags, ensuring all conditions of the rule are met to confirm detection. This rule is particularly relevant in environments where Perl is less commonly used, making detection of its misuse more critical.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2023-01-02