SigmaHQ/rules/windows/builtin/win_powershell_script_installed_as_service.yml

31 lines
762 B
YAML
Raw Normal View History

title: PowerShell Scripts Installed as Services
id: a2e5019d-a658-4c6a-92bf-7197b54e2cae
description: Detects powershell script installed as a Service
status: experimental
author: oscd.community, Natalia Shornikova
date: 2020/10/06
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
tag:
- attack.execution
- attack.t1569.002
logsource:
product: windows
detection:
selection1:
EventID:
- 7045
- 4697
ServiceFileName|contains:
- 'powershell'
- 'pwsh'
selection2:
EventID: 13
TargetObject: '*\Services\*\ImagePath'
Details|contains:
- 'powershell'
- 'pwsh'
condition: selection1 or selection2
falsepositives: Unknown
level: high