
Summary
This detection rule identifies instances where a new PowerShell module file (with extensions like .psm1, .psd1, .dll, or .ps1) is created by processes that are not recognized as PowerShell. It focuses on specific directories where PowerShell modules are typically stored, including \WindowsPowerShell\Modules\ and \PowerShell\7\Modules\. If a file creation event occurs in these folders but is initiated by an executable that does not fall under a defined list of PowerShell-related processes, the event is flagged. The detection is meant to catch potentially malicious behavior, as it is uncommon for non-PowerShell processes to create PowerShell module artifacts, which could indicate an attempt to persist payloads or compromise the system.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2023-05-09