heroui logo

Suspicious Hyper-V Cmdlets

Sigma Rules

View Source
Summary
The detection rule titled 'Suspicious Hyper-V Cmdlets' aims to identify potentially malicious actions performed through Windows PowerShell while utilizing Hyper-V for virtualization. Adversaries often exploit hypervisor capabilities to create virtual machines and execute harmful processes under the radar, making detection difficult. The rule activates when certain cmdlets related to Hyper-V, specifically 'New-VM', 'Set-VMFirmware', and 'Start-VM', are found in PowerShell script blocks. For effective monitoring, Script Block Logging must be enabled, allowing for the capture of command executions that could signal nefarious intended use of virtualization technologies. By focusing on these cmdlets, the detection can flag unauthorized or unexpected actions that might signify an attempt to evade security measures.
Categories
  • Endpoint
  • Windows
  • Infrastructure
Data Sources
  • Script
  • Process
ATT&CK Techniques
  • T1564.006
Created: 2022-04-09