mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-08 18:23:52 +00:00
42 lines
1.3 KiB
YAML
42 lines
1.3 KiB
YAML
title: Malicious PowerShell Commandlets
|
|
status: experimental
|
|
description: Detects Commandlet names from well-known PowerShell exploitation frameworks
|
|
reference: https://adsecurity.org/?p=2921
|
|
author: Sean Metcalf (source), Florian Roth (rule)
|
|
logsource:
|
|
product: windows
|
|
service: powershell
|
|
description: 'It is recommanded to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
|
detection:
|
|
keywords:
|
|
- AdjustTokenPrivileges
|
|
- IMAGE_NT_OPTIONAL_HDR64_MAGIC
|
|
- Management.Automation.RuntimeException
|
|
- Microsoft.Win32.UnsafeNativeMethods
|
|
- ReadProcessMemory.Invoke
|
|
- Runtime.InteropServices
|
|
- SE_PRIVILEGE_ENABLED
|
|
- System.Security.Cryptography
|
|
- System.Runtime.InteropServices
|
|
- LSA_UNICODE_STRING
|
|
- MiniDumpWriteDump
|
|
- PAGE_EXECUTE_READ
|
|
- Net.Sockets.SocketFlags
|
|
- Reflection.Assembly
|
|
- SECURITY_DELEGATION
|
|
- TOKEN_ADJUST_PRIVILEGES
|
|
- TOKEN_ALL_ACCESS
|
|
- TOKEN_ASSIGN_PRIMARY
|
|
- TOKEN_DUPLICATE
|
|
- TOKEN_ELEVATION
|
|
- TOKEN_IMPERSONATE
|
|
- TOKEN_INFORMATION_CLASS
|
|
- TOKEN_PRIVILEGES
|
|
- TOKEN_QUERY
|
|
- Metasploit
|
|
- Mimikatz
|
|
condition: keywords
|
|
falsepositives:
|
|
- Penetration tests
|
|
level: high
|