SigmaHQ/rules/windows/builtin/win_powershell_script_installed_as_service.yml

42 lines
925 B
YAML
Raw Normal View History

2020-10-17 23:16:11 +00:00
action: global
title: PowerShell Scripts Installed as Services
id: a2e5019d-a658-4c6a-92bf-7197b54e2cae
description: Detects powershell script installed as a Service
status: experimental
author: oscd.community, Natalia Shornikova
date: 2020/10/06
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
2020-10-17 23:16:11 +00:00
tags:
- attack.execution
- attack.t1569.002
detection:
2020-10-17 23:16:11 +00:00
powershell_as_service:
ServiceFileName|contains:
- 'powershell'
- 'pwsh'
condition: service_creation and powershell_as_service
falsepositives: Unknown
level: high
2020-10-17 23:16:11 +00:00
---
logsource:
product: windows
service: system
detection:
service_creation:
EventID: 7045
---
logsource:
product: windows
service: sysmon
detection:
service_creation:
EventID: 6
---
2020-10-17 23:16:11 +00:00
logsource:
product: windows
service: security
detection:
service_creation:
EventID: 4697