heroui logo

Execute Code with Pester.bat

Sigma Rules

View Source
Summary
The detection rule titled 'Execute Code with Pester.bat' focuses on identifying code execution through the Pester testing framework on Windows environments. Pester is a popular PowerShell module designed for running tests on PowerShell scripts and modules. The rule utilizes a combination of process creation logs and command line arguments to determine if Pester is being invoked in an unusual or malicious manner. The detection strategy includes monitoring the execution of PowerShell and command-line instances where the keywords 'Pester' or commands like 'Get-Help' are present. This method aims to differentiate between legitimate use cases, such as script testing, and potential malicious execution techniques that leverage Pester for abuse or lateral movements within an environment. The rule incorporates a logical condition: it triggers if either a PowerShell instance with specific command line parameters is detected or if a command prompt instance executes Pester-related commands. This nuanced approach allows for identifying potential security incidents while maintaining an awareness of false positives from legitimate Pester usage.
Categories
  • Windows
  • Endpoint
  • Application
Data Sources
  • Process
Created: 2020-10-08