PowerShell Base64 Encoding

Looks for the execution of powershell.exe with command lines that includes the term base64. Inspired by the 2022 Red Canary Threat Detection report.

Sigma rule (View on GitHub)

 1title: PowerShell Base64 Encoding
 2id: 1d3025d2-f965-42e2-8256-adaa1054613d
 3status: experimental
 4description: Looks for the execution of powershell.exe with command lines that includes
 5    the term base64. Inspired by the 2022 Red Canary Threat Detection report.
 6references:
 7    - https://redcanary.com/threat-detection-report/techniques/powershell/
 8author: Micah Babinski
 9date: 2022/11/03
10tags:
11    - attack.defense_evasion
12    - attack.t1140
13    - attack.execution
14    - attack.t1059.001
15logsource:
16    category: process_creation
17    product: windows
18detection:
19    selection:
20        CommandLine|contains: 'base64'
21        Image|endswith: '\powershell.exe'
22    condition: selection
23falsepositives:
24    - Windows Config Manager (https://wtfbins.wtf/1)
25level: high```

References

Related rules

to-top