2017-03-13 12:57:41 +00:00
title : PowerShell Network Connections
status : experimental
2018-07-10 14:13:41 +00:00
description : "Detects a Powershell process that opens network connections - check for suspicious target ports and target systems - adjust to your environment (e.g. extend filters with company's ip range')"
2017-03-13 12:57:41 +00:00
author : Florian Roth
2018-01-27 23:24:16 +00:00
references :
- https://www.youtube.com/watch?v=DLtJTxMWZ2o
2018-10-10 00:10:17 +00:00
tags :
- attack.execution
- attack.t1086
2017-03-13 12:57:41 +00:00
logsource :
product : windows
service : sysmon
detection :
selection :
EventID : 3
Image : '*\powershell.exe'
2017-03-13 17:45:15 +00:00
filter :
DestinationIp :
- '10.*'
- '192.168.*'
2019-01-04 09:50:41 +00:00
- '172.16.*'
- '172.17.*'
- '172.18.*'
- '172.19.*'
- '172.20.*'
- '172.21.*'
- '172.22.*'
- '172.23.*'
- '172.24.*'
- '172.25.*'
- '172.26.*'
- '172.27.*'
- '172.28.*'
- '172.29.*'
- '172.30.*'
- '172.31.*'
2017-03-13 17:45:15 +00:00
- '127.0.0.1'
DestinationIsIpv6 : 'false'
2017-03-13 18:09:29 +00:00
User : 'NT AUTHORITY\SYSTEM'
2017-03-13 17:45:15 +00:00
condition : selection and not filter
2017-03-13 12:57:41 +00:00
falsepositives :
- Administrative scripts
level : low