
Summary
The PowerShell PSReflect Script detection rule is designed to identify the use of the PSReflect library in PowerShell scripts, which allows access to Win32 API functions. This capability can be exploited by attackers for malicious purposes, making it critical for organizations to monitor its usage. PSReflect enables the dynamic enumeration and manipulation of Windows functionalities, frequently found in red team operations and malware tooling. The rule leverages structured queries against the logs generated from PowerShell activities to detect potential misuse. It is crucial for incident response teams to comprehend the extent of the script utilization and identify any indicators of compromise. This detection focuses on commands associated with PSReflect and filters out benign executions that do not originate from standard system accounts. Furthermore, the rule encourages proactive monitoring of related PowerShell and system behaviors to prevent and respond to threats effectively.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
- Script
- Logon Session
ATT&CK Techniques
- T1059
- T1059.001
- T1106
Created: 2021-10-15