Malicious PowerShell Scripts - FileCreation

Detects the creation of known offensive powershell scripts used for exploitation

Sigma rule (View on GitHub)

  1title: Malicious PowerShell Scripts - FileCreation
  2id: f331aa1f-8c53-4fc3-b083-cc159bc971cb
  3related:
  4    - id: 41025fd7-0466-4650-a813-574aaacbe7f4
  5      type: similar
  6status: test
  7description: Detects the creation of known offensive powershell scripts used for exploitation
  8references:
  9    - https://github.com/PowerShellMafia/PowerSploit
 10    - https://github.com/NetSPI/PowerUpSQL
 11    - https://github.com/CsEnox/EventViewer-UACBypass
 12    - https://web.archive.org/web/20210511204621/https://github.com/AlsidOfficial/WSUSpendu
 13    - https://github.com/nettitude/Invoke-PowerThIEf
 14    - https://github.com/S3cur3Th1sSh1t/WinPwn
 15    - https://github.com/S3cur3Th1sSh1t/PowerSharpPack/tree/master/PowerSharpBinaries
 16    - https://github.com/BC-SECURITY/Invoke-ZeroLogon/blob/111d17c7fec486d9bb23387e2e828b09a26075e4/Invoke-ZeroLogon.ps1
 17    - https://github.com/xorrior/RandomPS-Scripts/blob/848c919bfce4e2d67b626cbcf4404341cfe3d3b6/Get-DXWebcamVideo.ps1
 18    - https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/6f23bb41f9675d7e2d32bacccff75e931ae00554/OfficeMemScraper.ps1
 19    - https://github.com/dafthack/DomainPasswordSpray/blob/b13d64a5834694aa73fd2aea9911a83027c465a7/DomainPasswordSpray.ps1
 20    - https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/ # Invoke-TotalExec
 21    - https://research.nccgroup.com/2022/06/06/shining-the-light-on-black-basta/ # Invoke-TotalExec
 22    - https://github.com/HarmJ0y/DAMP
 23    - https://github.com/samratashok/nishang
 24    - https://github.com/DarkCoderSc/PowerRunAsSystem/
 25    - https://github.com/besimorhino/powercat
 26    - https://github.com/Kevin-Robertson/Powermad
 27    - https://github.com/adrecon/ADRecon
 28    - https://github.com/adrecon/AzureADRecon
 29author: Markus Neis, Nasreddine Bencherchali (Nextron Systems), Mustafa Kaan Demir, Georg Lauenstein
 30date: 2018-04-07
 31modified: 2024-01-25
 32tags:
 33    - attack.execution
 34    - attack.t1059.001
 35logsource:
 36    category: file_event
 37    product: windows
 38detection:
 39    selection_generic:
 40        TargetFilename|endswith:
 41            # Note: Please ensure alphabetical order when adding new entries
 42            - '\Add-ConstrainedDelegationBackdoor.ps1'
 43            - '\Add-Exfiltration.ps1'
 44            - '\Add-Persistence.ps1'
 45            - '\Add-RegBackdoor.ps1'
 46            - '\Add-RemoteRegBackdoor.ps1'
 47            - '\Add-ScrnSaveBackdoor.ps1'
 48            - '\ADRecon.ps1'
 49            - '\AzureADRecon.ps1'
 50            - '\Check-VM.ps1'
 51            - '\ConvertTo-ROT13.ps1'
 52            - '\Copy-VSS.ps1'
 53            - '\Create-MultipleSessions.ps1'
 54            - '\DNS_TXT_Pwnage.ps1'
 55            - '\dnscat2.ps1'
 56            - '\Do-Exfiltration.ps1'
 57            - '\DomainPasswordSpray.ps1'
 58            - '\Download_Execute.ps1'
 59            - '\Download-Execute-PS.ps1'
 60            - '\Enable-DuplicateToken.ps1'
 61            - '\Enabled-DuplicateToken.ps1'
 62            - '\Execute-Command-MSSQL.ps1'
 63            - '\Execute-DNSTXT-Code.ps1'
 64            - '\Execute-OnTime.ps1'
 65            - '\ExetoText.ps1'
 66            - '\Exploit-Jboss.ps1'
 67            - '\Find-AVSignature.ps1'
 68            - '\Find-Fruit.ps1'
 69            - '\Find-GPOLocation.ps1'
 70            - '\Find-TrustedDocuments.ps1'
 71            - '\FireBuster.ps1'
 72            - '\FireListener.ps1'
 73            - '\Get-ApplicationHost.ps1'
 74            - '\Get-ChromeDump.ps1'
 75            - '\Get-ClipboardContents.ps1'
 76            - '\Get-ComputerDetail.ps1'
 77            - '\Get-FoxDump.ps1'
 78            - '\Get-GPPAutologon.ps1'
 79            - '\Get-GPPPassword.ps1'
 80            - '\Get-IndexedItem.ps1'
 81            - '\Get-Keystrokes.ps1'
 82            - '\Get-LSASecret.ps1'
 83            - '\Get-MicrophoneAudio.ps1'
 84            - '\Get-PassHashes.ps1'
 85            - '\Get-PassHints.ps1'
 86            - '\Get-RegAlwaysInstallElevated.ps1'
 87            - '\Get-RegAutoLogon.ps1'
 88            - '\Get-RickAstley.ps1'
 89            - '\Get-Screenshot.ps1'
 90            - '\Get-SecurityPackages.ps1'
 91            - '\Get-ServiceFilePermission.ps1'
 92            - '\Get-ServicePermission.ps1'
 93            - '\Get-ServiceUnquoted.ps1'
 94            - '\Get-SiteListPassword.ps1'
 95            - '\Get-System.ps1'
 96            - '\Get-TimedScreenshot.ps1'
 97            - '\Get-UnattendedInstallFile.ps1'
 98            - '\Get-Unconstrained.ps1'
 99            - '\Get-USBKeystrokes.ps1'
100            - '\Get-VaultCredential.ps1'
101            - '\Get-VulnAutoRun.ps1'
102            - '\Get-VulnSchTask.ps1'
103            - '\Get-WebConfig.ps1'
104            - '\Get-WebCredentials.ps1'
105            - '\Get-WLAN-Keys.ps1'
106            - '\Gupt-Backdoor.ps1'
107            - '\HTTP-Backdoor.ps1'
108            - '\HTTP-Login.ps1'
109            - '\Install-ServiceBinary.ps1'
110            - '\Install-SSP.ps1'
111            - '\Invoke-ACLScanner.ps1'
112            - '\Invoke-ADSBackdoor.ps1'
113            - '\Invoke-AmsiBypass.ps1'
114            - '\Invoke-ARPScan.ps1'
115            - '\Invoke-BackdoorLNK.ps1'
116            - '\Invoke-BadPotato.ps1'
117            - '\Invoke-BetterSafetyKatz.ps1'
118            - '\Invoke-BruteForce.ps1'
119            - '\Invoke-BypassUAC.ps1'
120            - '\Invoke-Carbuncle.ps1'
121            - '\Invoke-Certify.ps1'
122            - '\Invoke-ConPtyShell.ps1'
123            - '\Invoke-CredentialInjection.ps1'
124            - '\Invoke-CredentialsPhish.ps1'
125            - '\Invoke-DAFT.ps1'
126            - '\Invoke-DCSync.ps1'
127            - '\Invoke-Decode.ps1'
128            - '\Invoke-DinvokeKatz.ps1'
129            - '\Invoke-DllInjection.ps1'
130            - '\Invoke-DNSUpdate.ps1'
131            - '\Invoke-DowngradeAccount.ps1'
132            - '\Invoke-EgressCheck.ps1'
133            - '\Invoke-Encode.ps1'
134            - '\Invoke-EventViewer.ps1'
135            - '\Invoke-Eyewitness.ps1'
136            - '\Invoke-FakeLogonScreen.ps1'
137            - '\Invoke-Farmer.ps1'
138            - '\Invoke-Get-RBCD-Threaded.ps1'
139            - '\Invoke-Gopher.ps1'
140            - '\Invoke-Grouper2.ps1'
141            - '\Invoke-Grouper3.ps1'
142            - '\Invoke-HandleKatz.ps1'
143            - '\Invoke-Interceptor.ps1'
144            - '\Invoke-Internalmonologue.ps1'
145            - '\Invoke-Inveigh.ps1'
146            - '\Invoke-InveighRelay.ps1'
147            - '\Invoke-JSRatRegsvr.ps1'
148            - '\Invoke-JSRatRundll.ps1'
149            - '\Invoke-KrbRelay.ps1'
150            - '\Invoke-KrbRelayUp.ps1'
151            - '\Invoke-LdapSignCheck.ps1'
152            - '\Invoke-Lockless.ps1'
153            - '\Invoke-MalSCCM.ps1'
154            - '\Invoke-Mimikatz.ps1'
155            - '\Invoke-MimikatzWDigestDowngrade.ps1'
156            - '\Invoke-Mimikittenz.ps1'
157            - '\Invoke-MITM6.ps1'
158            - '\Invoke-NanoDump.ps1'
159            - '\Invoke-NetRipper.ps1'
160            - '\Invoke-NetworkRelay.ps1'
161            - '\Invoke-NinjaCopy.ps1'
162            - '\Invoke-OxidResolver.ps1'
163            - '\Invoke-P0wnedshell.ps1'
164            - '\Invoke-P0wnedshellx86.ps1'
165            - '\Invoke-Paranoia.ps1'
166            - '\Invoke-PortScan.ps1'
167            - '\Invoke-PoshRatHttp.ps1'
168            - '\Invoke-PoshRatHttps.ps1'
169            - '\Invoke-PostExfil.ps1'
170            - '\Invoke-PowerDump.ps1'
171            - '\Invoke-PowerShellIcmp.ps1'
172            - '\Invoke-PowerShellTCP.ps1'
173            - '\Invoke-PowerShellTcpOneLine.ps1'
174            - '\Invoke-PowerShellTcpOneLineBind.ps1'
175            - '\Invoke-PowerShellUdp.ps1'
176            - '\Invoke-PowerShellUdpOneLine.ps1'
177            - '\Invoke-PowerShellWMI.ps1'
178            - '\Invoke-PowerThIEf.ps1'
179            - '\Invoke-PPLDump.ps1'
180            - '\Invoke-Prasadhak.ps1'
181            - '\Invoke-PsExec.ps1'
182            - '\Invoke-PsGcat.ps1'
183            - '\Invoke-PsGcatAgent.ps1'
184            - '\Invoke-PSInject.ps1'
185            - '\Invoke-PsUaCme.ps1'
186            - '\Invoke-ReflectivePEInjection.ps1'
187            - '\Invoke-ReverseDNSLookup.ps1'
188            - '\Invoke-Rubeus.ps1'
189            - '\Invoke-RunAs.ps1'
190            - '\Invoke-SafetyKatz.ps1'
191            - '\Invoke-SauronEye.ps1'
192            - '\Invoke-SCShell.ps1'
193            - '\Invoke-Seatbelt.ps1'
194            - '\Invoke-ServiceAbuse.ps1'
195            - '\Invoke-SessionGopher.ps1'
196            - '\Invoke-ShellCode.ps1'
197            - '\Invoke-SMBScanner.ps1'
198            - '\Invoke-Snaffler.ps1'
199            - '\Invoke-Spoolsample.ps1'
200            - '\Invoke-SSHCommand.ps1'
201            - '\Invoke-SSIDExfil.ps1'
202            - '\Invoke-StandIn.ps1'
203            - '\Invoke-StickyNotesExtract.ps1'
204            - '\Invoke-Tater.ps1'
205            - '\Invoke-Thunderfox.ps1'
206            - '\Invoke-ThunderStruck.ps1'
207            - '\Invoke-TokenManipulation.ps1'
208            - '\Invoke-Tokenvator.ps1'
209            - '\Invoke-TotalExec.ps1'
210            - '\Invoke-UrbanBishop.ps1'
211            - '\Invoke-UserHunter.ps1'
212            - '\Invoke-VoiceTroll.ps1'
213            - '\Invoke-Whisker.ps1'
214            - '\Invoke-WinEnum.ps1'
215            - '\Invoke-winPEAS.ps1'
216            - '\Invoke-WireTap.ps1'
217            - '\Invoke-WmiCommand.ps1'
218            - '\Invoke-WScriptBypassUAC.ps1'
219            - '\Invoke-Zerologon.ps1'
220            - '\Keylogger.ps1'
221            - '\MailRaider.ps1'
222            - '\New-HoneyHash.ps1'
223            - '\OfficeMemScraper.ps1'
224            - '\Offline_Winpwn.ps1'
225            - '\Out-CHM.ps1'
226            - '\Out-DnsTxt.ps1'
227            - '\Out-Excel.ps1'
228            - '\Out-HTA.ps1'
229            - '\Out-Java.ps1'
230            - '\Out-JS.ps1'
231            - '\Out-Minidump.ps1'
232            - '\Out-RundllCommand.ps1'
233            - '\Out-SCF.ps1'
234            - '\Out-SCT.ps1'
235            - '\Out-Shortcut.ps1'
236            - '\Out-WebQuery.ps1'
237            - '\Out-Word.ps1'
238            - '\Parse_Keys.ps1'
239            - '\Port-Scan.ps1'
240            - '\PowerBreach.ps1'
241            - '\powercat.ps1'
242            - '\Powermad.ps1'
243            - '\PowerRunAsSystem.psm1'
244            - '\PowerSharpPack.ps1'
245            - '\PowerUp.ps1'
246            - '\PowerUpSQL.ps1'
247            - '\PowerView.ps1'
248            - '\PSAsyncShell.ps1'
249            - '\RemoteHashRetrieval.ps1'
250            - '\Remove-Persistence.ps1'
251            - '\Remove-PoshRat.ps1'
252            - '\Remove-Update.ps1'
253            - '\Run-EXEonRemote.ps1'
254            - '\Schtasks-Backdoor.ps1'
255            - '\Set-DCShadowPermissions.ps1'
256            - '\Set-MacAttribute.ps1'
257            - '\Set-RemotePSRemoting.ps1'
258            - '\Set-RemoteWMI.ps1'
259            - '\Set-Wallpaper.ps1'
260            - '\Show-TargetScreen.ps1'
261            - '\Speak.ps1'
262            - '\Start-CaptureServer.ps1'
263            - '\Start-WebcamRecorder.ps1'
264            - '\StringToBase64.ps1'
265            - '\TexttoExe.ps1'
266            - '\VolumeShadowCopyTools.ps1'
267            - '\WinPwn.ps1'
268            - '\WSUSpendu.ps1'
269    selection_invoke_sharp:
270        TargetFilename|contains: 'Invoke-Sharp' # Covers all "Invoke-Sharp" variants
271        TargetFilename|endswith: '.ps1'
272    condition: 1 of selection_*
273falsepositives:
274    - Unknown
275level: high

References

Related rules

to-top