
Summary
This detection rule identifies the usage of the 'FromBase64String' function in PowerShell command lines, which indicates the presence of potentially malicious encoded commands. Attackers often use Base64 encoding to obfuscate their scripts or command invocations to evade detection mechanisms. The rule is specifically designed to trigger whenever the command line includes '::FromBase64String('. The significance of this detection lies in its ability to highlight preemptive security concerns during process creation instances on Windows systems. The potential false positives are considered, particularly in cases of administrative script libraries, as these legitimate scripts may also use Base64 encoding for benign purposes. Maintaining vigilance against the misuse of this function is crucial for protecting systems from encoded threats, thereby enhancing endpoint security.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-01-29