PowerShell Download Pattern
Detects a Powershell process that contains download commands in its command line string
Sigma rule (View on GitHub)
1title: PowerShell Download Pattern
2id: 3b6ab547-8ec2-4991-b9d2-2b06702a48d7
3related:
4 - id: e6c54d94-498c-4562-a37c-b469d8e9a275
5 type: derived
6status: test
7description: Detects a Powershell process that contains download commands in its command line string
8references:
9 - https://blog.redteam.pl/2020/06/black-kingdom-ransomware.html
10 - https://lab52.io/blog/winter-vivern-all-summer/
11 - https://hatching.io/blog/powershell-analysis/
12author: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro
13date: 2019-01-16
14modified: 2023-01-26
15tags:
16 - attack.execution
17 - attack.t1059.001
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection_img:
23 - Image|endswith:
24 - '\powershell.exe'
25 - '\pwsh.exe'
26 - OriginalFileName:
27 - 'PowerShell.EXE'
28 - 'pwsh.dll'
29 selection_cli:
30 CommandLine|contains|all:
31 - 'new-object'
32 - 'net.webclient).'
33 - 'download'
34 CommandLine|contains:
35 - 'string('
36 - 'file('
37 condition: all of selection_*
38falsepositives:
39 - Unknown
40level: medium
References
Related rules
- AWS EC2 Startup Shell Script Change
- Alternate PowerShell Hosts - PowerShell Module
- Bad Opsec Powershell Code Artifacts
- BloodHound Collection Files
- Certificate Exported Via PowerShell