title: Suspicious PowerShell Keywords status: experimental description: Detects keywords that could indicate the use of some PowerShell exploitation framework date: 2019/02/11 author: Florian Roth references: - https://posts.specterops.io/entering-a-covenant-net-command-and-control-e11038bcf462 tags: - attack.execution - attack.t1086 logsource: product: windows service: powershell definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277' detection: keywords: Message: - "*[System.Reflection.Assembly]::Load*" condition: keywords falsepositives: - Penetration tests level: high