Added Sigma Rules
This commit is contained in:
@@ -0,0 +1,32 @@
|
||||
title: Alternate PowerShell Hosts
|
||||
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
|
||||
date: 2019/09/12
|
||||
description: Detects alternate PowerShell hosts potentially bypassing detections looking
|
||||
for powershell.exe
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 7
|
||||
SELECTION_2:
|
||||
Description: System.Management.Automation
|
||||
SELECTION_3:
|
||||
ImageLoaded: '*System.Management.Automation*'
|
||||
SELECTION_4:
|
||||
Image: '*\powershell.exe'
|
||||
condition: (SELECTION_1 and (SELECTION_2 and SELECTION_3) and not (SELECTION_4))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
id: fe6e002f-f244-4278-9263-20e4b593827f
|
||||
level: medium
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
modified: 2021/05/12
|
||||
references:
|
||||
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190815181010.html
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
yml_filename: sysmon_alternate_powershell_hosts_moduleload.yml
|
||||
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/image_load
|
||||
|
||||
Reference in New Issue
Block a user