
Summary
This detection rule identifies instances where PowerShell is used to execute the `Invoke-Command` cmdlet, targeting remote endpoints via the Windows Remote Management (WinRM) protocol. The use of this cmdlet can signify lateral movement within a network or an attempt by an adversary to execute arbitrary code remotely. By analyzing the command-line arguments passed to `powershell.exe`, the rule can detect potentially malicious activity based on telemetry gathered from Endpoint Detection and Response (EDR) agents, particularly focusing on the execution of a process on remote systems that may indicate unauthorized access or compromise. This detection is crucial for identifying threats that leverage PowerShell for remote execution, enabling defenders to respond to potential intrusions and mitigate risks to sensitive networks.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Windows Registry
- Logon Session
ATT&CK Techniques
- T1021
- T1021.006
Created: 2024-11-13