PowerShell Set-Acl On Windows Folder - PsScript
Detects PowerShell scripts to set the ACL to a file in the Windows folder
Sigma rule (View on GitHub)
1title: PowerShell Set-Acl On Windows Folder - PsScript
2id: 3bf1d859-3a7e-44cb-8809-a99e066d3478
3related:
4 - id: cae80281-ef23-44c5-873b-fd48d2666f49 # PsScript Low
5 type: derived
6 - id: 0944e002-e3f6-4eb5-bf69-3a3067b53d73 # ProcCreation Susp
7 type: derived
8 - id: bdeb2cff-af74-4094-8426-724dc937f20a # ProcCreation Low
9 type: derived
10status: test
11description: Detects PowerShell scripts to set the ACL to a file in the Windows folder
12references:
13 - https://github.com/redcanaryco/atomic-red-team/blob/74438b0237d141ee9c99747976447dc884cb1a39/atomics/T1505.005/T1505.005.md
14 - https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-acl?view=powershell-5.1
15author: frack113, Nasreddine Bencherchali (Nextron Systems)
16date: 2023-07-18
17tags:
18 - attack.defense-evasion
19 - attack.t1222
20logsource:
21 product: windows
22 category: ps_script
23 definition: bade5735-5ab0-4aa7-a642-a11be0e40872
24detection:
25 selection_cmdlet:
26 ScriptBlockText|contains|all:
27 - 'Set-Acl '
28 - '-AclObject '
29 selection_paths:
30 # Note: Add more suspicious paths
31 ScriptBlockText|contains:
32 - '-Path "C:\Windows'
33 - '-Path "C:/Windows'
34 - "-Path 'C:\\Windows"
35 - "-Path 'C:/Windows"
36 - '-Path C:\\Windows'
37 - '-Path C:/Windows'
38 - '-Path $env:windir'
39 - '-Path "$env:windir'
40 - "-Path '$env:windir"
41 selection_permissions:
42 # Note: Add more suspicious permissions
43 ScriptBlockText|contains:
44 - 'FullControl'
45 - 'Allow'
46 condition: all of selection_*
47falsepositives:
48 - Unknown
49level: high
References
Related rules
- PowerShell Script Change Permission Via Set-Acl - PsScript
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern