heroui logo

PowerShell as a Service in Registry

Sigma Rules

View Source
Summary
This detection rule identifies instances where PowerShell code has been written to the Windows Registry as a service. It looks specifically for keys that contain the substring '\Services\' and end with '\ImagePath', indicating a potential unauthorized service configuration. Additionally, the rule checks for details that contain the terms 'powershell' or 'pwsh', which are commonly associated with PowerShell commands or scripts. This technique of using PowerShell in service configurations can be part of an attacker's strategy to maintain persistence or execute code without raising alarms in traditional security monitoring mechanisms. The rule is categorized under high severity given its potential to enable malicious actors to execute arbitrary commands remotely, thus posing a significant threat to system integrity and security.
Categories
  • Windows
Data Sources
  • Windows Registry
Created: 2020-10-06