SigmaHQ/rules/windows/process_creation/win_encoded_iex.yml

29 lines
641 B
YAML
Raw Normal View History

2019-08-23 21:13:23 +00:00
title: Encoded IEX
2019-11-12 22:12:27 +00:00
id: 88f680b8-070e-402c-ae11-d2914f2257f1
2019-08-23 21:13:23 +00:00
status: experimental
description: Detects a base64 encoded IEX command string in a process command line
author: Florian Roth
date: 2019/08/23
tags:
- attack.t1086
2019-08-23 21:19:39 +00:00
- attack.t1140
2019-08-23 21:13:23 +00:00
- attack.execution
2020-06-16 20:46:08 +00:00
- attack.t1059.003
2019-08-23 21:13:23 +00:00
logsource:
category: process_creation
product: windows
detection:
selection:
2020-06-16 20:46:08 +00:00
CommandLine|base64offset|contains:
- 'IEX (['
- 'iex (['
- 'iex (New'
- 'IEX (New'
2019-08-23 21:13:23 +00:00
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- unknown
level: critical