Suspicious PowerShell Parent Process
Detects a suspicious or uncommon parent processes of PowerShell
Sigma rule (View on GitHub)
1title: Suspicious PowerShell Parent Process
2id: 754ed792-634f-40ae-b3bc-e0448d33f695
3related:
4 - id: 692f0bec-83ba-4d04-af7e-e884a96059b6
5 type: derived
6status: test
7description: Detects a suspicious or uncommon parent processes of PowerShell
8references:
9 - https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=26
10author: Teymur Kheirkhabarov, Harish Segar
11date: 2020-03-20
12modified: 2023-02-04
13tags:
14 - attack.execution
15 - attack.t1059.001
16logsource:
17 category: process_creation
18 product: windows
19detection:
20 selection_parent:
21 - ParentImage|contains: 'tomcat'
22 - ParentImage|endswith:
23 - '\amigo.exe'
24 - '\browser.exe'
25 - '\chrome.exe'
26 - '\firefox.exe'
27 - '\httpd.exe'
28 - '\iexplore.exe'
29 - '\jbosssvc.exe'
30 - '\microsoftedge.exe'
31 - '\microsoftedgecp.exe'
32 - '\MicrosoftEdgeSH.exe'
33 - '\mshta.exe'
34 - '\nginx.exe'
35 - '\outlook.exe'
36 - '\php-cgi.exe'
37 - '\regsvr32.exe'
38 - '\rundll32.exe'
39 - '\safari.exe'
40 - '\services.exe'
41 - '\sqlagent.exe'
42 - '\sqlserver.exe'
43 - '\sqlservr.exe'
44 - '\vivaldi.exe'
45 - '\w3wp.exe'
46 selection_powershell:
47 - Image|endswith:
48 - '\powershell.exe'
49 - '\pwsh.exe'
50 - CommandLine|contains:
51 - '/c powershell' # FPs with sub processes that contained "powershell" somewhere in the command line
52 - '/c pwsh'
53 - Description: 'Windows PowerShell'
54 - Product: 'PowerShell Core 6'
55 - OriginalFileName:
56 - 'PowerShell.EXE'
57 - 'pwsh.dll'
58 condition: all of selection_*
59falsepositives:
60 - Other scripts
61level: high
References
Related rules
- AWS EC2 Startup Shell Script Change
- Alternate PowerShell Hosts - PowerShell Module
- Bad Opsec Powershell Code Artifacts
- BloodHound Collection Files
- Certificate Exported Via PowerShell