heroui logo

Malicious PowerShell Commandlets - ProcessCreation

Sigma Rules

View Source
Summary
This detection rule targets malicious PowerShell commandlets that are indicative of exploitation attempts via PowerShell exploitation frameworks, which can be utilized for executing code, exfiltration of data, and persistence mechanisms on Windows systems. The approach focuses on monitoring process creation activities and analyzing the command line parameters of the executed processes for specific commandlet names known to be associated with various attack techniques. The detection logic leverages the 'CommandLine' field to filter and identify processes invoking these commandlets as defined in the selection criteria. The rule has a high severity level, indicating its significance in identifying potential threats in real-time. Security teams are advised to investigate any instances where these commandlets are executed, as they are often part of broader attack scenarios involving privilege escalation, credential dumping, and lateral movement across networks.
Categories
  • Windows
Data Sources
  • Process
Created: 2023-01-02