Windows PowerShell User Agent

Detects Windows PowerShell Web Access

Sigma rule (View on GitHub)

 1title: Windows PowerShell User Agent
 2id: c8557060-9221-4448-8794-96320e6f3e74
 3status: test
 4description: Detects Windows PowerShell Web Access
 5references:
 6    - https://msdn.microsoft.com/powershell/reference/5.1/microsoft.powershell.utility/Invoke-WebRequest
 7author: Florian Roth (Nextron Systems)
 8date: 2017/03/13
 9modified: 2021/11/27
10tags:
11    - attack.defense_evasion
12    - attack.command_and_control
13    - attack.t1071.001
14logsource:
15    category: proxy
16detection:
17    selection:
18        c-useragent|contains: ' WindowsPowerShell/'
19    condition: selection
20falsepositives:
21    - Administrative scripts that download files from the Internet
22    - Administrative scripts that retrieve certain website contents
23level: medium

References

Related rules

to-top