
Summary
The rule focuses on detecting the obfuscated use of standard input (stdin) to execute PowerShell scripts, which is a technique often employed by attackers to evade detection and execute malicious commands without being easily recognizable. This detection method relies on the presence of specific script block logging within Windows PowerShell. It looks for command lines that execute PowerShell with potential obfuscation, particularly patterns indicating the use of `cmd` to execute PowerShell via stdin with parameters that indicate obfuscation, such as using variables like `$input` or the `noexit` flag. This detection tactic aligns with techniques outlined in the Mitre ATT&CK framework, specifically targeting strategies associated with command-line interfaces and script execution on Windows systems. The rule is supported by the requirement that 'Script Block Logging' must be enabled for its functionality, making it crucial for organizations to ensure this logging is active to properly utilize the detection capabilities offered by this rule.
Categories
- Windows
- Cloud
- Endpoint
Data Sources
- Process
- Command
- Application Log
Created: 2020-10-15