Windows PowerShell User Agent
Detects Windows PowerShell Web Access
Sigma rule (View on GitHub)
1title: Windows PowerShell User Agent
2id: c8557060-9221-4448-8794-96320e6f3e74
3status: test
4description: Detects Windows PowerShell Web Access
5references:
6 - https://msdn.microsoft.com/powershell/reference/5.1/microsoft.powershell.utility/Invoke-WebRequest
7author: Florian Roth (Nextron Systems)
8date: 2017-03-13
9modified: 2021-11-27
10tags:
11 - attack.defense-evasion
12 - attack.command-and-control
13 - attack.t1071.001
14logsource:
15 category: proxy
16detection:
17 selection:
18 c-useragent|contains: ' WindowsPowerShell/'
19 condition: selection
20falsepositives:
21 - Administrative scripts that download files from the Internet
22 - Administrative scripts that retrieve certain website contents
23level: medium
References
Related rules
- Bitsadmin to Uncommon IP Server Address
- Bitsadmin to Uncommon TLD
- ComRAT Network Communication
- HTTP Request With Empty User Agent
- HackTool - CobaltStrike Malleable Profile Patterns - Proxy