Files
hayabusa/rules/Sigma/win_susp_use_of_csharp_console.yml
2021-11-14 11:00:56 +09:00

32 lines
987 B
YAML

title: Suspicious Use of CSharp Interactive Console
author: Michael R. (@nahamike01)
date: 2020/03/08
description: Detects the execution of CSharp interactive console by PowerShell
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
Image: '*\csi.exe'
SELECTION_3:
ParentImage: '*\powershell.exe'
SELECTION_4:
OriginalFileName: csi.exe
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4)
falsepositives:
- Possible depending on environment. Pair with other factors such as net connections,
command-line args, etc.
id: a9e416a8-e613-4f8b-88b8-a7d1d1af2f61
level: high
logsource:
category: process_creation
product: windows
references:
- https://redcanary.com/blog/detecting-attacks-leveraging-the-net-framework/
status: experimental
tags:
- attack.execution
- attack.t1127
yml_filename: win_susp_use_of_csharp_console.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation