
Summary
This detection rule aims to identify the execution of potentially malicious PowerShell commandlets, particularly those associated with known exploitation frameworks. It focuses on catching commandlets that are commonly linked to intrusion techniques, such as data exfiltration, privileges escalation, and system compromises. The rule requires Script Block Logging to be enabled in PowerShell, and it monitors for specific substrings within the commandlet texts. The list of commandlets includes a variety of actions like gaining unauthorized access to Active Directory objects, exfiltrating data, and exploiting Windows security vulnerabilities. The detection aims to expose threats by identifying these commandlets when they are executed, thereby helping security teams respond to potential attacks more effectively. The references included provide further context on various exploitation techniques and samples of malicious scripts.
Categories
- Windows
- Endpoint
Data Sources
- Script
Created: 2017-03-05