
Summary
This detection rule identifies the use of PowerShell's `DownloadString` method, which is often leveraged by malicious scripts to retrieve and execute remote code. The detection relies on process execution logs from Endpoint Detection and Response (EDR) systems, specifically monitoring for command-line invocations that contain the `DownloadString` keyword. This activity is critical as it signifies potential threats involving command-and-control communications or other malicious behaviors, leading to unauthorized access or data breaches. The rule aggregates data from Sysmon Event ID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2 to flag suspicious PowerShell operations, alerting security teams to investigate further and mitigate risks.
Categories
- Endpoint
- Windows
Data Sources
- Command
- Process
ATT&CK Techniques
- T1059.001
- T1059
- T1105
Created: 2024-11-13