diff --git a/rules/windows/powershell/powershell_suspicious_profile_create.yml b/rules/windows/powershell/powershell_suspicious_profile_create.yml index 2ea39108..7b112b02 100644 --- a/rules/windows/powershell/powershell_suspicious_profile_create.yml +++ b/rules/windows/powershell/powershell_suspicious_profile_create.yml @@ -1,22 +1,24 @@ -title: Powershell profile modify +title: 'Powershell profile modify' status: experimental description: 'Detects a change in profile.ps1 of Powershell profile' references: - 'https://www.welivesecurity.com/2019/05/29/turla-powershell-usage/' -tags: - - attack.persistence author: HieuTT35 date: 2019/10/24 logsource: product: windows service: sysmon detection: - selection: - EventID: 11 - TargetFilename|re: - - '.*\\My Documents\\PowerShell\\(Microsoft\.)?.*(Profile|profile)\.ps1' - - 'C\:\\Windows\\System32\\WindowsPowerShell\\v1\.0\\(Microsoft\.)?.*(Profile|profile)\.ps1' - condition: selection + event: + EventID: 11 + target1: + TargetFilename|re: '.*\\My Documents\\PowerShell\\(Microsoft\.)?.*(Profile|profile)\.ps1' + target2: + TargetFilename|re: 'C\:\\Windows\\System32\\WindowsPowerShell\\v1\.0\\(Microsoft\.)?.*(Profile|profile)\.ps1' + condition: event and (target1 or target2) falsepositives: - - unknown + - 'System administrator create Powershell profile manually' level: high +tags: + - attack.persistence + - attack.privilege_escalation