heroui logo

Suspicious PowerShell Invocations - Generic - PowerShell Module

Sigma Rules

View Source
Summary
This detection rule targets suspicious PowerShell invocations that often indicate malicious activity. Specifically, it focuses on certain command parameters that attackers are known to use to obfuscate their actions or evade detection measures. The rule monitors for encoded command patterns such as '-enc,' '-EncodedCommand,' and '-ec,' which are common in malware execution to bypass security tools. Additionally, it checks for hidden window parameters like '-w hidden' or hidden style settings like '-windowstyle hidden,' which attackers may employ to execute scripts unnoticed. The rule is structured to use logical conditions that require any of the defined suspicious command parameters to trigger an alert, thus ensuring comprehensive coverage against diverse attack techniques.
Categories
  • Endpoint
  • Windows
Data Sources
  • Script
Created: 2017-03-12