Powershell Suspicious Win32_PnPEntity
Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.
Sigma rule (View on GitHub)
1title: Powershell Suspicious Win32_PnPEntity
2id: b26647de-4feb-4283-af6b-6117661283c5
3status: test
4description: Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1120/T1120.md
7author: frack113
8date: 2021-08-23
9modified: 2022-12-25
10tags:
11 - attack.discovery
12 - attack.t1120
13logsource:
14 product: windows
15 category: ps_script
16 definition: 'Requirements: Script Block Logging must be enabled'
17detection:
18 selection:
19 ScriptBlockText|contains: Win32_PnPEntity
20 condition: selection
21falsepositives:
22 - Admin script
23level: low
References
Related rules
- Fsutil Drive Enumeration
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- AD Groups Or Users Enumeration Using PowerShell - PoshModule
- AD Groups Or Users Enumeration Using PowerShell - ScriptBlock