heroui logo

Windows File Download Via PowerShell

Splunk Security Content

View Source
Summary
This detection rule monitors the use of PowerShell's download methods, specifically targeting the `WebClient` class methods like `DownloadString`, `DownloadData`, and related aliases such as `Invoke-WebRequest`, `IWR`, and `curl`. These methods are often employed in malicious scripts to fetch and execute remote payloads, making their detection critical for preventing unauthorized access and data exfiltration. The rule utilizes command-line details captured in Endpoint Detection and Response (EDR) logs to identify potentially harmful activities initiated by PowerShell processes. This behavior, if confirmed, can lead to significant security incidents, including the downloading and execution of arbitrary code on the compromised systems.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1059.001
  • T1105
Created: 2025-06-23