Invoke-Obfuscation STDIN+ Launcher

Detects Obfuscated use of stdin to execute PowerShell

Sigma rule (View on GitHub)

 1title: Invoke-Obfuscation STDIN+ Launcher
 2id: de7fb680-6efa-4bf3-af2c-14b6d33c8e6e
 3related:
 4    - id: 72862bf2-0eb1-11eb-adc1-0242ac120002
 5      type: derived
 6description: Detects Obfuscated use of stdin to execute PowerShell
 7status: unsupported
 8author: Jonathan Cheong, oscd.community
 9date: 2020/10/15
10modified: 2021/09/17
11references:
12     - https://github.com/SigmaHQ/sigma/issues/1009 #(Task 25)
13tags:
14    - attack.defense_evasion
15    - attack.t1027
16    - attack.execution
17    - attack.t1059.001
18logsource:
19    product: windows
20    category: driver_load
21detection:
22    selection:
23        ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r).+powershell.+(?:\$\{?input\}?|noexit).+\"'
24    condition: selection 
25falsepositives:
26    - Unknown
27level: high```

References

Related rules

to-top