
Summary
This detection rule is designed to identify the execution of obfuscated PowerShell commands utilizing the Clip.exe service, which is an inherent component within Windows responsible for clipboard operations. The method pertains directly to tactics of defense evasion, specifically through the laundering of potentially malicious scripts via clipboard interaction. The detection leverages Windows Security Event ID 4697, which logs the creation of new service files. This rule triggers when a service file name contains specific substrings indicative of clipboard use, such as 'Clipboard' or any obfuscated identifier associated with PowerShell. With the increasing trend of employing benign Windows features for malicious purposes, this rule aims to enhance visibility into adversarial behaviors that attempt to hide within legitimate operations. As noted, false positives may arise but remain largely undetermined at this stage, necessitating further tuning based on operational environments to reduce noise while maintaining detection efficacy.
Categories
- Windows
- Endpoint
- Application
Data Sources
- Process
- Script
- Service
Created: 2020-10-09