Files
hayabusa/rules/Sigma/win_susp_powershell_parent_combo.yml
2021-11-14 11:00:56 +09:00

41 lines
1.1 KiB
YAML

title: Suspicious PowerShell Invocation Based on Parent Process
author: Florian Roth
date: 2019/01/16
description: Detects suspicious powershell invocations from interpreters or unusual
programs
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
ParentImage: '*\wscript.exe'
SELECTION_3:
ParentImage: '*\cscript.exe'
SELECTION_4:
Image: '*\powershell.exe'
SELECTION_5:
CurrentDirectory: '*\Health Service State\\*'
condition: (SELECTION_1 and ((SELECTION_2 or SELECTION_3) and SELECTION_4) and not
(SELECTION_5))
falsepositives:
- Microsoft Operations Manager (MOM)
- Other scripts
fields:
- CommandLine
- ParentCommandLine
id: 95eadcb2-92e4-4ed1-9031-92547773a6db
level: medium
logsource:
category: process_creation
product: windows
modified: 2020/11/28
references:
- https://www.carbonblack.com/2017/03/15/attackers-leverage-excel-powershell-dns-latest-non-malware-attack/
status: experimental
tags:
- attack.execution
- attack.t1059.001
- attack.t1086
yml_filename: win_susp_powershell_parent_combo.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation