HackTool - Empire PowerShell Launch Parameters
Detects suspicious powershell command line parameters used in Empire
Sigma rule (View on GitHub)
1title: HackTool - Empire PowerShell Launch Parameters
2id: 79f4ede3-402e-41c8-bc3e-ebbf5f162581
3status: test
4description: Detects suspicious powershell command line parameters used in Empire
5references:
6 - https://github.com/EmpireProject/Empire/blob/c2ba61ca8d2031dad0cfc1d5770ba723e8b710db/lib/common/helpers.py#L165
7 - https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/deaduser.py#L191
8 - https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/resolver.py#L178
9 - https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/privesc/Invoke-EventVwrBypass.ps1#L64
10author: Florian Roth (Nextron Systems)
11date: 2019-04-20
12modified: 2023-02-21
13tags:
14 - attack.execution
15 - attack.t1059.001
16logsource:
17 category: process_creation
18 product: windows
19detection:
20 selection:
21 CommandLine|contains:
22 - ' -NoP -sta -NonI -W Hidden -Enc '
23 - ' -noP -sta -w 1 -enc '
24 - ' -NoP -NonI -W Hidden -enc '
25 - ' -noP -sta -w 1 -enc'
26 - ' -enc SQB'
27 - ' -nop -exec bypass -EncodedCommand '
28 condition: selection
29falsepositives:
30 - Other tools that incidentally use the same command line parameters
31level: high
References
Related rules
- AWS EC2 Startup Shell Script Change
- Alternate PowerShell Hosts - PowerShell Module
- Bad Opsec Powershell Code Artifacts
- BloodHound Collection Files
- Certificate Exported Via PowerShell