
Summary
This detection rule identifies obfuscated PowerShell commands executed via Clip.exe, targeting Windows systems. Specifically, it focuses on events logged by the Service Control Manager (SCM) that indicate the creation of a new service, where the service's ImagePath contains references to the clipboard. This often signifies an attempt to obfuscate malicious actions, as attackers may disguise their PowerShell operational commands to evade detection mechanisms. By monitoring for EventID 7045 from the SCM, security teams can uncover potential shifts in activity indicative of lateral movement or persistence mechanisms that involve the manipulation of clipboard data.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Logon Session
Created: 2020-10-09