Process Executing with Unusual Command Lines

Looks for the execution of non-powershell process with command lines matching common powershell format. Inspired by the 2022 Red Canary Threat Detection report.

Sigma rule (View on GitHub)

 1title: Process Executing with Unusual Command Lines
 2id: 9c644369-a7c5-4166-a702-930efd9b5579
 3status: experimental
 4description: Looks for the execution of non-powershell process with command lines
 5    matching common powershell format. Inspired by the 2022 Red Canary Threat Detection
 6    report.
 7references:
 8    - https://redcanary.com/threat-detection-report/techniques/rename-system-utilities/
 9author: Micah Babinski
10date: 2022/11/04
11tags:
12    - attack.defense_evasion
13    - attack.t1036.003
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection:
19        CommandLine|contains:
20            - 'iex'
21            - 'invoke-expression'
22    filter:
23        Image|endswith: '\powershell.exe'
24    condition: selection and not filter
25falsepositives:
26    - Unknown
27level: high```

References

Related rules

to-top