PowerShell Script With File Upload Capabilities
Detects PowerShell scripts leveraging the "Invoke-WebRequest" cmdlet to send data via either "PUT" or "POST" method.
Sigma rule (View on GitHub)
1title: PowerShell Script With File Upload Capabilities
2id: d2e3f2f6-7e09-4bf2-bc5d-90186809e7fb
3status: test
4description: Detects PowerShell scripts leveraging the "Invoke-WebRequest" cmdlet to send data via either "PUT" or "POST" method.
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1020/T1020.md
7 - https://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html
8 - https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-webrequest?view=powershell-7.4
9author: frack113
10date: 2022-01-07
11modified: 2023-05-04
12tags:
13 - attack.exfiltration
14 - attack.t1020
15logsource:
16 product: windows
17 category: ps_script
18 definition: bade5735-5ab0-4aa7-a642-a11be0e40872
19detection:
20 selection_cmdlet:
21 ScriptBlockText|contains:
22 - 'Invoke-WebRequest'
23 - 'iwr '
24 selection_flag:
25 ScriptBlockText|contains:
26 - '-Method Put'
27 - '-Method Post'
28 condition: all of selection_*
29falsepositives:
30 - Unknown
31level: low
References
Related rules
- AWS RDS Master Password Change
- PowerShell Script With File Hostname Resolving Capabilities
- Restore Public AWS RDS Instance
- Suspicious Inbox Forwarding
- Suspicious BlackCat-Related Exfiltration Command