add definition to powershell-classic

This commit is contained in:
frack113 2021-08-16 12:56:24 +02:00
parent f69868b5aa
commit 2dbf9af27d
12 changed files with 23 additions and 12 deletions

View File

@ -37,6 +37,7 @@ detection:
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection_cmd:
HostApplication|contains: 'Invoke-ATHRemoteFXvGPUDisablementCommand '

View File

@ -29,6 +29,7 @@ detection:
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection:
HostApplication|contains|all:

View File

@ -4,7 +4,7 @@ id: 64e8e417-c19a-475a-8d19-98ea705394cc
description: Detects alternate PowerShell hosts potentially bypassing detections looking for powershell.exe
status: experimental
date: 2019/08/11
modified: 2021/08/03
modified: 2021/08/16
author: Roberto Rodriguez @Cyb3rWard0g
references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190815181010.html
@ -17,14 +17,6 @@ falsepositives:
- MSP Detection Searcher
- Citrix ConfigSync.ps1
level: medium
detection:
filter:
- ContextInfo: 'powershell.exe'
- Message: 'powershell.exe'
# Both fields contain key=value pairs where the key HostApplication is relevant but
# can't be referred directly as event field.
condition: selection and not filter
---
logsource:
product: windows
@ -33,11 +25,19 @@ detection:
selection:
EventID: 4103
ContextInfo: '*'
filter:
ContextInfo: 'powershell.exe'
condition: selection and not filter
---
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection:
EventID: 400
ContextInfo: '*'
HostApplication: '*'
detection:
filter:
HostApplication: 'powershell.exe'
condition: selection and not filter

View File

@ -15,6 +15,7 @@ modified: 2021/08/03
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection_obj:
CommandLine|contains|all:

View File

@ -14,6 +14,7 @@ date: 2017/03/22
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection:
EventID: 400

View File

@ -14,6 +14,7 @@ date: 2017/03/05
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection1:
EventID: 400

View File

@ -19,6 +19,7 @@ level: medium
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection:
EventID: 400
@ -30,7 +31,6 @@ detection:
logsource:
product: windows
service: powershell
detection:
selection:
EventID: 4103

View File

@ -32,6 +32,7 @@ detection:
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection:
EventID: 400

View File

@ -13,6 +13,7 @@ tags:
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection:
EventID: 400

View File

@ -28,6 +28,7 @@ detection:
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
downloadfile:
EventID: 400 # get 400 ,403 and 600 for 1 execution

View File

@ -9,12 +9,14 @@ references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1562.001/T1562.001.md
author: frack113
date: 2021/06/07
modified: 2021/08/16
falsepositives:
- Unknown
level: high
logsource:
product: windows
category: powershell-classic
service: powershell-classic
definition: fields have to be extract from event
detection:
select_EventID:
EventID: 600

View File

@ -11,6 +11,7 @@ tags:
logsource:
product: windows
service: powershell-classic
definition: fields have to be extract from event
detection:
selection:
EventID: 400