2017-03-13 12:57:41 +00:00
title : PowerShell Network Connections
status : experimental
2017-03-13 17:45:15 +00:00
description : "Detetcs a Powershell process that opens network connections - check for suspicious target ports and target systems - adjust to your environment (e.g. extend filters with company's ip range')"
2017-03-13 12:57:41 +00:00
author : Florian Roth
reference : https://www.youtube.com/watch?v=DLtJTxMWZ2o
logsource :
product : windows
service : sysmon
detection :
selection :
EventID : 3
Image : '*\powershell.exe'
2017-03-13 17:45:15 +00:00
filter :
DestinationIp :
- '10.*'
- '192.168.*'
- '172.*'
- '127.0.0.1'
DestinationIsIpv6 : 'false'
2017-03-13 18:09:29 +00:00
User : 'NT AUTHORITY\SYSTEM'
2017-03-13 17:45:15 +00:00
condition : selection and not filter
2017-03-13 12:57:41 +00:00
falsepositives :
- Administrative scripts
level : low