
Summary
This detection rule is designed to identify obfuscated usage of the Clip.exe utility in PowerShell executions. The rule focuses on detecting commands that manipulate the clipboard or invoke command line operations in a potentially malicious fashion, indicative of defense evasion tactics often employed by attackers to bypass traditional security mechanisms. Specifically, the detection mechanism looks for certain patterns in the command line parameters associated with process creation events in Windows that utilize Clip.exe. By targeting the command line containing specific strings that are characteristic of obfuscation, this rule aims to alert security personnel to unusual behavior that may signify an attempted execution of malicious scripts or commands. This approach leverages the inherent capabilities of Clip.exe, often overlooked in security monitoring, positioning it as an integral part of modern attack strategies that utilize PowerShell for execution.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Application Log
Created: 2020-10-13