SigmaHQ/rules/windows/process_creation/win_powershell_xor_commandline.yml

21 lines
544 B
YAML
Raw Normal View History

title: Suspicious XOR Encoded PowerShell Command Line
2019-11-12 22:12:27 +00:00
id: bb780e0c-16cf-4383-8383-1e5471db6cf9
description: Detects suspicious powershell process which includes bxor command, alternatvide obfuscation method to b64 encoded commands.
status: experimental
author: Sami Ruohonen
date: 2018/09/05
tags:
- attack.execution
- attack.t1086
detection:
selection:
CommandLine:
- '* -bxor*'
condition: selection
falsepositives:
- unknown
level: medium
logsource:
category: process_creation
product: windows