heroui logo

Powershell Processing Stream Of Data

Splunk Security Content

View Source
Summary
This analytic rule detects suspicious PowerShell script executions that involve the processing of compressed stream data, which can be indicative of malicious activity. The rule leverages Windows Event Code 4104 from PowerShell's Script Block Logging, specifically looking for script block texts that include the classes `IO.Compression`, `IO.StreamReader`, or any method that utilizes decompression. The significance of this behavior lies in its frequent use by attackers to obfuscate their scripts, facilitating hidden code execution, privilege escalation, or persistence within a system. This detection mechanism is critical in identifying potential threats as attackers often employ these techniques to avoid standard security measures.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1059
  • T1059.001
Created: 2024-11-22