2019-11-26 23:02:45 +00:00
action : global
2020-02-20 22:00:16 +00:00
title : Invoke-Obfuscation Obfuscated IEX Invocation
2019-12-19 22:56:36 +00:00
id : 51aa9387-1c53-4153-91cc-d73c59ae1ca9
description : "Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the following code block \u2014 https://github.com/danielbohannon/Invoke-Obfuscation/blob/master/Out-ObfuscatedStringCommand.ps1#L873-L888"
2019-11-26 23:02:45 +00:00
status : experimental
author : Daniel Bohannon (@Mandiant/@FireEye), oscd.community
date : 2019 /11/08
tags :
- attack.defense_evasion
- attack.t1027
falsepositives :
- Unknown
level : high
detection :
2020-06-15 17:14:31 +00:00
selection_1 :
2019-11-26 23:02:45 +00:00
- ImagePath|re : '\$PSHome\[\s*\d{1,3}\s*\]\s*\+\s*\$PSHome\['
- ImagePath|re : '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\['
- ImagePath|re : '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\['
- ImagePath|re : '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}'
- ImagePath|re : '\*mdr\*\W\s*\)\.Name'
- ImagePath|re : '\$VerbosePreference\.ToString\('
- ImagePath|re : '\String\]\s*\$VerbosePreference'
2020-06-15 17:14:31 +00:00
condition : selection and selection_1
2019-11-26 23:02:45 +00:00
---
logsource :
product : windows
service : system
detection :
selection :
EventID : 7045
---
logsource :
product : windows
service : sysmon
detection :
selection :
EventID : 6
---
logsource :
product : windows
service : security
detection :
selection :
EventID : 4697