heroui logo

VsCode Powershell Profile Modification

Sigma Rules

View Source
Summary
This detection rule is designed to identify suspicious alterations to the Visual Studio Code (VSCode) PowerShell profile file. The PowerShell profile, located at '\Microsoft.VSCode_profile.ps1', is a script that runs when a new PowerShell session starts, allowing users to configure their environment. Attackers may exploit this by modifying the profile to execute malicious scripts automatically, providing a method of persistence on a compromised system. The rule focuses on file events on Windows systems, specifically monitoring for the creation or modification of the VSCode PowerShell profile. This behavior may indicate potential malicious activity, hence the importance of its monitoring in the context of threat detection. The alert generated by this rule can prompt further investigation to determine if any unauthorized changes were made to the profile, thus protecting against attacks that leverage this vector for persistence and privilege escalation.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2022-08-24