heroui logo

Malicious PowerShell Scripts - PoshModule

Sigma Rules

View Source
Summary
The 'Malicious PowerShell Scripts - PoshModule' rule is designed to detect the execution of offensive PowerShell scripts that are commonly used for exploitation or reconnaissance in a Windows environment. This detection mechanism works by analyzing the content of PowerShell scripts being executed and flagging any scripts that match specific patterns associated with known malicious activities. The rule captures a broad set of scripts which includes a variety of malicious tools targeting different aspects of system vulnerabilities and user interactions. Potential execution of these scripts impacts system security, enabling unauthorized access, reconnaissance, data exfiltration, and other forms of cyber attacks. The rule, currently in a test state, can identify malicious activities based on predefined script names, improving security posture against common PowerShell threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Logon Session
  • Application Log
  • Network Traffic
Created: 2023-01-23