Potential PowerShell Execution Policy Tampering - ProcCreation
Detects changes to the PowerShell execution policy registry key in order to bypass signing requirements for script execution from the CommandLine
Sigma rule (View on GitHub)
1title: Potential PowerShell Execution Policy Tampering - ProcCreation
2id: cf2e938e-9a3e-4fe8-a347-411642b28a9f
3related:
4 - id: fad91067-08c5-4d1a-8d8c-d96a21b37814 # ProcCreation Registry
5 type: similar
6 - id: 87e3c4e8-a6a8-4ad9-bb4f-46e7ff99a180 # ProcCreation Cmdlet
7 type: similar
8 - id: 61d0475c-173f-4844-86f7-f3eebae1c66b # PowerShell ScriptBlock
9 type: similar
10status: test
11description: Detects changes to the PowerShell execution policy registry key in order to bypass signing requirements for script execution from the CommandLine
12references:
13 - https://learn.microsoft.com/de-de/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-7.3
14author: Nasreddine Bencherchali (Nextron Systems)
15date: 2023-01-11
16tags:
17 - attack.defense-evasion
18logsource:
19 product: windows
20 category: process_creation
21detection:
22 selection_path:
23 CommandLine|contains:
24 - '\ShellIds\Microsoft.PowerShell\ExecutionPolicy'
25 - '\Policies\Microsoft\Windows\PowerShell\ExecutionPolicy'
26 selection_values:
27 CommandLine|contains:
28 - 'Bypass'
29 - 'RemoteSigned'
30 - 'Unrestricted'
31 condition: all of selection_*
32falsepositives:
33 - Unknown
34level: high
References
Related rules
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity