heroui logo

PowerShell Base64 Encoded FromBase64String Cmdlet

Sigma Rules

View Source
Summary
This detection rule targets the use of the PowerShell `FromBase64String` cmdlet, which is commonly exploited by malicious actors for executing obfuscated commands. The rule specifically looks for instances in the process command line that contain the phrase `::FromBase64String`, suggesting that Base64 encoded data is being processed potentially for evasion tactics. It also checks for specific Base64 strings that could represent executable commands with malicious intent. Given the use of Base64 encoding to obfuscate command execution, this rule is significant for identifying attempts to execute potentially harmful operations without obvious indicators. The rule's effectiveness is accentuated by its ability to catch encoded payloads, making it crucial for incident response and threat hunting activities related to script-based attacks.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2019-08-24