atomic-threat-coverage/detection_rules/powershell_xor_commandline.yml
2019-02-12 04:55:11 +01:00

30 lines
776 B
YAML
Executable File

action: global
title: Suspicious XOR Encoded PowerShell Command Line
description: Detects suspicious powershell process which includes bxor command, alternatvide obfuscation method to b64 encoded commands.
status: experimental
author: Sami Ruohonen
date: 2018/09/05
detection:
selection:
CommandLine:
- '* -bxor*'
condition: selection
falsepositives:
- unknown
level: medium
---
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
---
logsource:
product: windows
service: security
definition: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
detection:
selection:
EventID: 4688