
Summary
This detection rule identifies suspicious PowerShell scripts capable of taking screenshots, a technique commonly used in post-exploitation scenarios and by remote access tools (RATs). The rule triggers on events where user scripts include the 'CopyFromScreen' method from 'System.Drawing.Bitmap', indicating the execution of potentially malicious logic aimed at capturing visual information from a target machine. PowerShell's flexibility makes it attractive for attackers, and scripts that intermingle administration tasks with exfiltration tactics can go unnoticed in typical enterprise environments. The rule advises thorough investigation of the script's content and execution context, focusing on DLL imports, suspicious behavior, and any exfiltration patterns. In case of detection, an incident response protocol is recommended, which includes isolating affected systems and analyzing user activity. This rule facilitates enhancement of security posture by deterring unauthorized use of PowerShell for malicious purposes.
Categories
- Endpoint
- Windows
- Cloud
Data Sources
- Windows Registry
- Process
- Application Log
- Script
- Logon Session
ATT&CK Techniques
- T1113
- T1059
- T1059.001
Created: 2021-10-19