heroui logo

Suspicious XOR Encoded PowerShell Command

Sigma Rules

View Source
Summary
The rule detects potentially malicious PowerShell commands that may be XOR encoded, which is a technique often used by attackers to obfuscate their scripts from detection. The primary function of the rule is to monitor PowerShell process creation on a Windows environment, specifically filtering for command lines that include signs of XOR encoding indicated by the presence of `bxor`, as well as typical PowerShell commands indicative of obfuscation. The detection logic involves monitoring for process launches from `powershell.exe` or `pwsh.exe`, validating against specific criteria detailed in the detection section such as command line arguments that contain either certain keywords related to standard PowerShell usage or direct indications of XOR encoding. The rule aims at identifying suspicious activities that align with known attack techniques, enhancing the detection capabilities of security teams against possible exploitation of PowerShell, which is a common tool employed in cyber attacks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2018-09-05