
Summary
The detection rule is designed to identify potentially malicious PowerShell execution using obfuscation techniques, specifically through the manipulation of environment variables. This technique is often utilized by attackers to conceal the true intent of their commands, making it a common tactic in defense evasion strategies. By monitoring events generated by the Service Control Manager (SCM) within the Windows operating system, particularly Event ID 7045, the rule looks for the presence of the 'cmd' command with specific flags and patterns that indicate obfuscation, such as the use of 'set' commands in an unusual manner. Detection relies on entries that include 'ImagePath' containing certain command patterns, suggesting that an attempt is being made to execute malware or unauthorized scripts. This rule can help security teams detect when an adversary tries to execute commands in a disguised manner, enabling proactive measures to be taken against potential compromises.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Logon Session
Created: 2020-10-15