Files
hayabusa/rules/Sigma/win_powershell_suspicious_parameter_variation.yml
2021-11-14 11:00:56 +09:00

117 lines
3.7 KiB
YAML

title: Suspicious PowerShell Parameter Substring
author: Florian Roth (rule), Daniel Bohannon (idea), Roberto Rodriguez (Fix)
date: 2019/01/16
description: Detects suspicious PowerShell invocation with a parameter substring
detection:
SELECTION_1:
EventID: 1
SELECTION_10:
CommandLine: '* -win h*'
SELECTION_11:
CommandLine: '* -wi h*'
SELECTION_12:
CommandLine: '* -win h *'
SELECTION_13:
CommandLine: '* -win hi *'
SELECTION_14:
CommandLine: '* -win hid *'
SELECTION_15:
CommandLine: '* -win hidd *'
SELECTION_16:
CommandLine: '* -win hidde *'
SELECTION_17:
CommandLine: '* -NoPr *'
SELECTION_18:
CommandLine: '* -NoPro *'
SELECTION_19:
CommandLine: '* -NoProf *'
SELECTION_2:
Image: '*\Powershell.exe'
SELECTION_20:
CommandLine: '* -NoProfi *'
SELECTION_21:
CommandLine: '* -NoProfil *'
SELECTION_22:
CommandLine: '* -nonin *'
SELECTION_23:
CommandLine: '* -nonint *'
SELECTION_24:
CommandLine: '* -noninte *'
SELECTION_25:
CommandLine: '* -noninter *'
SELECTION_26:
CommandLine: '* -nonintera *'
SELECTION_27:
CommandLine: '* -noninterac *'
SELECTION_28:
CommandLine: '* -noninteract *'
SELECTION_29:
CommandLine: '* -noninteracti *'
SELECTION_3:
CommandLine: '* -windowstyle h *'
SELECTION_30:
CommandLine: '* -noninteractiv *'
SELECTION_31:
CommandLine: '* -ec *'
SELECTION_32:
CommandLine: '* -encodedComman *'
SELECTION_33:
CommandLine: '* -encodedComma *'
SELECTION_34:
CommandLine: '* -encodedComm *'
SELECTION_35:
CommandLine: '* -encodedCom *'
SELECTION_36:
CommandLine: '* -encodedCo *'
SELECTION_37:
CommandLine: '* -encodedC *'
SELECTION_38:
CommandLine: '* -encoded *'
SELECTION_39:
CommandLine: '* -encode *'
SELECTION_4:
CommandLine: '* -windowstyl h*'
SELECTION_40:
CommandLine: '* -encod *'
SELECTION_41:
CommandLine: '* -enco *'
SELECTION_42:
CommandLine: '* -en *'
SELECTION_5:
CommandLine: '* -windowsty h*'
SELECTION_6:
CommandLine: '* -windowst h*'
SELECTION_7:
CommandLine: '* -windows h*'
SELECTION_8:
CommandLine: '* -windo h*'
SELECTION_9:
CommandLine: '* -wind h*'
condition: (SELECTION_1 and (SELECTION_2) and (SELECTION_3 or SELECTION_4 or SELECTION_5
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10
or SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15
or SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20
or SELECTION_21 or SELECTION_22 or SELECTION_23 or SELECTION_24 or SELECTION_25
or SELECTION_26 or SELECTION_27 or SELECTION_28 or SELECTION_29 or SELECTION_30
or SELECTION_31 or SELECTION_32 or SELECTION_33 or SELECTION_34 or SELECTION_35
or SELECTION_36 or SELECTION_37 or SELECTION_38 or SELECTION_39 or SELECTION_40
or SELECTION_41 or SELECTION_42))
falsepositives:
- Penetration tests
id: 36210e0d-5b19-485d-a087-c096088885f0
level: high
logsource:
category: process_creation
product: windows
modified: 2020/07/14
references:
- http://www.danielbohannon.com/blog-1/2017/3/12/powershell-execution-argument-obfuscation-how-it-can-make-detection-easier
status: experimental
tags:
- attack.execution
- attack.t1086
- attack.t1059.001
yml_filename: win_powershell_suspicious_parameter_variation.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation