You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I want to propose a rule enabling the detection of PowerShell without using the well-known powershell.exe but rather via rundll32.exe and various other methods. Projects like PowerShx and its predecessor PowerShdll enable this method of PowerShell Execution. Happy to gather feedback from you!
Hi @nasbench thanks for the swift feedback - I apparently overlooked those two rules.
To my understanding the two rules should cover what I want to detect.
Not too sure if the additional resources provided add anything to "enhance" the existing rules, but apart from that I think this issue can be closed :)
Still haven't delve deep into them, I appreciate you providing them and will definitely look into it to see if I can improve them in any form. I'll leave this open for now just so I can get back to you once I finish checking everything in them.
Thanks once again, really appreciate it the feedback
Description of the Idea of the Rule
I want to propose a rule enabling the detection of PowerShell without using the well-known
powershell.exe
but rather viarundll32.exe
and various other methods. Projects like PowerShx and its predecessor PowerShdll enable this method of PowerShell Execution. Happy to gather feedback from you!Public References / Example Event Log
The text was updated successfully, but these errors were encountered: