heroui logo

PowerShell Suspicious Script with Clipboard Retrieval Capabilities

Elastic Detection Rules

View Source
Summary
The detection rule identifies potentially malicious PowerShell scripts that can access the clipboard, a method attackers use to capture sensitive data like credentials and confidential communications. This rule targets attempts where the clipboard is accessed through common PowerShell commands related to clipboard manipulation. The detection utilizes log inputs from Windows environments to track relevant script activities, specifically looking for script block text indicating clipboard access alongside filtering for known benign scripts and ignoring typical system service accounts. The rule emphasizes a structured response strategy, highlighting investigation steps and potential mitigation techniques to prevent risks associated with clipboard data leakage. Its framework aligns with established MITRE ATT&CK techniques, aiding in situational awareness in security operations.
Categories
  • Windows
  • Endpoint
  • Application
  • Infrastructure
Data Sources
  • Process
  • Script
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1115
  • T1059
  • T1059.001
Created: 2023-01-12