PowerShell Web Access Feature Enabled Via DISM
Detects the use of DISM to enable the PowerShell Web Access feature, which could be used for remote access and potential abuse
Sigma rule (View on GitHub)
 1title: PowerShell Web Access Feature Enabled Via DISM
 2id: 7e8f2d3b-9c1a-4f67-b9e8-8d9006e0e51f
 3status: test
 4description: Detects the use of DISM to enable the PowerShell Web Access feature, which could be used for remote access and potential abuse
 5references:
 6    - https://docs.microsoft.com/en-us/powershell/module/dism/enable-windowsoptionalfeature
 7    - https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a
 8    - https://gist.github.com/MHaggis/7e67b659af9148fa593cf2402edebb41
 9author: Michael Haag
10date: 2024-09-03
11tags:
12    - attack.privilege-escalation
13    - attack.defense-evasion
14    - attack.persistence
15    - attack.t1548.002
16logsource:
17    category: process_creation
18    product: windows
19detection:
20    selection_img:
21        - Image|endswith: '\dism.exe'
22        - OriginalFileName: 'DISM.EXE'
23    selection_cli:
24        CommandLine|contains|all:
25            - 'WindowsPowerShellWebAccess'
26            - '/online'
27            - '/enable-feature'
28    condition: all of selection_*
29falsepositives:
30    - Legitimate PowerShell Web Access installations by administrators
31level: high
References
Related rules
- Shell Open Registry Keys Manipulation
- Trusted Path Bypass via Windows Directory Spoofing
- UAC Bypass With Fake DLL
- APT27 - Emissary Panda Activity
- AWS IAM S3Browser LoginProfile Creation
 
                                