heroui logo

Powershell XML Execute Command

Sigma Rules

View Source
Summary
This detection rule identifies the potential misuse of PowerShell commands that involve executing XML-related operations within a script block. PowerShell is commonly used by both administrators for legitimate tasks and by adversaries for malicious purposes, such as executing unauthorized commands or scripts. The detection focuses on identifying script blocks containing specific XML-related commands, which could indicate an attempt to exploit PowerShell for legitimate administrative actions or for conducting attacks. The rule specifies that Script Block Logging must be enabled for the detection to function, highlighting the importance of this logging feature in monitoring PowerShell activities effectively. Additionally, the detection incorporates various PowerShell execution commands, ensuring coverage over common patterns used by adversaries. It is important to be aware of potential false positives, primarily from legitimate administrative scripts that utilize similar commands. Overall, this rule is crucial in maintaining the integrity of the environment by monitoring potentially harmful activities executed via PowerShell.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Script
  • Logon Session
ATT&CK Techniques
  • T1059.001
Created: 2022-01-19