
Summary
This detection rule targets potentially malicious activities using PowerShell scripts, specifically focusing on the creation of binary executables and script files. The rule identifies instances where PowerShell is executed, and it checks if the command results in the creation of files with specific extensions commonly associated with scripts and executables, such as .bat, .exe, .dll, etc. The detection logic includes filters to eliminate benign behavior by checking the file paths, particularly those within user temp directories and Windows temp directories. The rule is designed to trigger when PowerShell commands result in creating these file types outside of defined filter conditions. This enhances the detection of potential malware dropper activities while allowing for flexible usage in various environments, where false positives can occur based on legitimate use of PowerShell for script execution.
Categories
- Endpoint
- Windows
Data Sources
- Process
- File
Created: 2023-03-17