
Summary
The detection rule focuses on identifying malicious activity involving the execution of PowerShell under a renamed executable. This behavior is typically a tactic used by threat actors to evade security mechanisms that monitor standard PowerShell activity. The rule looks specifically for processes whose names diverge from the standard 'powershell.exe' or 'pwsh.exe', especially if executed from unconventional paths with dubious command-line arguments. Such renamed binaries are often linked to Living-off-the-Land Binaries (LOLBins) and fileless malware strategies commonly adopted in cyber attacks. By monitoring events from Sysmon, specifically Event ID 1, the rule captures these renamed executions, providing insights into potential abusive PowerShell activities. Stakeholders can effectively implement the detection by ingesting proper EDR logs, ensuring the data maps correctly to the Endpoint data model, which aids in identifying and investigating potential threats efficiently.
Categories
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1036.003
Created: 2025-05-07