heroui logo

PowerShell DownloadFile

Sigma Rules

View Source
Summary
This rule detects the execution of PowerShell commands that specifically utilize the 'WebClient' object to invoke the 'DownloadFile' method. The focus of the detection is on scenarios where these elements are executed in a single command line. By monitoring process creation events in Windows, the rule identifies when this potentially malicious activity occurs, which is indicative of attempts to download and execute content from external sources, potentially as part of a larger attack or malware deployment. Given the ease with which PowerShell can be used for both legitimate and malicious purposes, distinguishing these specific actions helps in proactive threat detection and security monitoring.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2020-08-28