Files
hayabusa/rules/PowershellOperational/400_T1562.010_PowershellV2DowngradeAttack.yml
Tanaka Zakku f29b7d2d1a Updated rules
2021-11-06 09:51:38 +09:00

20 lines
783 B
YAML

title: Powershell 2.0 Downgrade Attack
title: Powershell 2.0へのダウングレード攻撃
description: An attacker may have started Powershell 2.0 to evade detection.
description_jp: 攻撃者は検知されないようにPowershell 2.0を起動したリスクがある。
author: Matsui
contributor: James Takai, itiB, Zach Mathis
mitre_attack: T1562.010
level: high
detection:
selection:
Channel: Microsoft-Windows-PowerShell/Operational
EventID: 400
EventData|re: '[\s\S]*EngineVersion=2\.0[\s\S]*'
falsepositives:
- legacy application
output: 'Powershell 2.0 downgrade attack detected!'
output_jp: 'Powershell 2.0へんおダウングレード攻撃は検知された!'
creation_date: 2020/11/08
updated_date: 2021/11/06