
Summary
This detection rule aims to identify obfuscated PowerShell scripts that utilize the COMPRESS OBFUSCATION technique. It specifically looks for script block logging entries containing certain keywords and methods indicative of compression and obfuscation practices. The presence of 'new-object' and methods like 'system.io.compression.deflatestream' and 'system.io.streamreader', combined with the ending 'readtoend', suggests that the script in question works with data streams that may be compressed, hinting at an evasion technique often used by attackers to hide malicious activity from security solutions. Requirements include having script block logging enabled on Windows systems, allowing the rule to monitor script executions effectively. The identified behaviors are consistent with established techniques listed in the MITRE ATT&CK framework, particularly under tactics related to execution and defense evasion.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Application Log
Created: 2020-10-18