Potential Encoded PowerShell Patterns In CommandLine

Detects specific combinations of encoding methods in PowerShell via the commandline

Sigma rule (View on GitHub)

 1title: Potential Encoded PowerShell Patterns In CommandLine
 2id: cdf05894-89e7-4ead-b2b0-0a5f97a90f2f
 3related:
 4    - id: 5b572dcf-254b-425c-a8c5-d9af6bea35a6
 5      type: similar
 6status: test
 7description: Detects specific combinations of encoding methods in PowerShell via the commandline
 8references:
 9    - https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=65
10author: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton
11date: 2020/10/11
12modified: 2023/01/26
13tags:
14    - attack.defense_evasion
15    - attack.t1027
16    - attack.execution
17    - attack.t1059.001
18logsource:
19    category: process_creation
20    product: windows
21detection:
22    selection_img:
23        - Image|endswith:
24              - '\powershell.exe'
25              - '\pwsh.exe'
26        - OriginalFileName:
27              - 'PowerShell.EXE'
28              - 'pwsh.dll'
29    selection_to_1:
30        CommandLine|contains:
31            - 'ToInt'
32            - 'ToDecimal'
33            - 'ToByte'
34            - 'ToUint'
35            - 'ToSingle'
36            - 'ToSByte'
37    selection_to_2:
38        CommandLine|contains:
39            - 'ToChar'
40            - 'ToString'
41            - 'String'
42    selection_gen_1:
43        CommandLine|contains|all:
44            - 'char'
45            - 'join'
46    selection_gen_2:
47        CommandLine|contains|all:
48            - 'split'
49            - 'join'
50    condition: selection_img and (all of selection_to_* or 1 of selection_gen_*)
51falsepositives:
52    - Unknown
53level: low

References

Related rules

to-top