Invoke-Obfuscation VAR+ Launcher

Detects Obfuscated use of Environment Variables to execute PowerShell

Sigma rule (View on GitHub)

 1title: Invoke-Obfuscation VAR+ Launcher
 2id: 3e27b010-2cf2-4577-8ef0-3ea44aaea0dc
 3related:
 4    - id: 8ca7004b-e620-4ecb-870e-86129b5b8e75
 5      type: derived
 6description: Detects Obfuscated use of Environment Variables to execute PowerShell
 7status: unsupported
 8author: Jonathan Cheong, oscd.community
 9date: 2020/10/15
10modified: 2021/09/17
11references:
12     - https://github.com/SigmaHQ/sigma/issues/1009 #(Task 24)
13tags:
14    - attack.defense_evasion
15    - attack.t1027
16    - attack.execution
17    - attack.t1059.001
18logsource:
19    product: windows
20    category: driver_load
21detection:
22    selection:
23        ImagePath|re: '.*cmd.{0,5}(?:\/c|\/r)(?:\s|)\"set\s[a-zA-Z]{3,6}.*(?:\{\d\}){1,}\\\"\s+?\-f(?:.*\)){1,}.*\"'
24    condition: selection
25falsepositives:
26    - Unknown
27level: high

References

Related rules

to-top