heroui logo

Execution of Powershell Script in Public Folder

Sigma Rules

View Source
Summary
This detection rule identifies the execution of PowerShell scripts that are located in the Public folder of Windows systems, specifically 'C:\Users\Public'. The rule triggers when a process creation event occurs involving PowerShell executables ('powershell.exe' or 'pwsh.exe') with command line arguments that reference scripts in the Public folder. This behavior is noteworthy as it may indicate malicious activity, as attackers often utilize PowerShell for executing scripts in public or shared locations to avoid detection. The rule checks for various command line options that include the path to the Public folder, ensuring comprehensive coverage of potential execution patterns.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-04-06