heroui logo

Suspicious PowerShell Download - Powershell Script

Sigma Rules

View Source
Summary
This detection rule identifies suspicious PowerShell download commands that may be used by threat actors to execute malicious scripts. It focuses on the use of the `System.Net.WebClient` class within PowerShell scripts to fetch data from the Internet. The rule requires that Script Block Logging is enabled on the Windows machine, which allows for monitoring and logging of PowerShell commands executed in the environment. The detection logic checks for specific methods pertaining to file downloading from the WebClient class, including `DownloadFile`, `DownloadFileAsync`, `DownloadString`, and `DownloadStringAsync`. If any of these methods are identified in a PowerShell script, combined with the presence of `System.Net.WebClient`, the rule will trigger an alert. Although legitimate PowerShell scripts may also use these commands to download content from the Internet, this rule aims to identify potentially malicious activities while accounting for possible false positives from benign software updates or user actions.
Categories
  • Windows
  • Endpoint
  • Application
Data Sources
  • Script
  • Process
Created: 2017-03-05