SigmaHQ/rules/proxy/proxy_powershell_ua.yml
2020-10-15 23:24:06 -03:00

28 lines
761 B
YAML

title: Windows PowerShell User Agent
id: c8557060-9221-4448-8794-96320e6f3e74
status: experimental
description: Detects Windows PowerShell Web Access
author: Florian Roth
date: 2017/03/13
modified: 2020/09/03
references:
- https://msdn.microsoft.com/powershell/reference/5.1/microsoft.powershell.utility/Invoke-WebRequest
logsource:
category: proxy
detection:
selection:
c-useragent|contains: ' WindowsPowerShell/'
condition: selection
fields:
- ClientIP
- c-uri
- c-useragent
falsepositives:
- Administrative scripts that download files from the Internet
- Administrative scripts that retrieve certain website contents
level: medium
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001