
Summary
The 'Suspicious Powershell Script' detection rule is designed to detect anomalies in PowerShell script executions that may indicate malicious activity. Specifically, the rule leverages machine learning to identify unusual data characteristics such as obfuscation, which is commonly used by attackers to conceal the true intent of scripts. When enabled, this rule monitors PowerShell script activity over the past 45 minutes, running checks every 15 minutes. If the defined anomaly threshold of 50 is exceeded, an alert is triggered, allowing security teams to investigate potential threats. The rule serves as an essential component of endpoint security on Windows systems and integrates with Elastic Defend and Windows monitoring solutions. It necessitates the installation of associated machine learning jobs and configurations in Kibana and requires integrations to ensure that the necessary data is collected and processed. The potential risks associated with this rule include false positives; for instance, legitimate automated scripts employing obfuscation may trigger alerts. Guidance for investigation, including analysis of user behavior and script execution history, is provided to support security teams in identifying legitimate threats from benign activity.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- Container
- Windows Registry
- Application Log
- Command
- Process
ATT&CK Techniques
- T1059
- T1059.001
Created: 2020-03-25