Skip to content

Commit beec664

Browse files
authored
Merge pull request SigmaHQ#3189 from redsand/fp_encoded_powershell_minor_indicator_due_to_devops
reducing level due to low indicator, per devops processes
2 parents 611ad5f + d4781fa commit beec664

3 files changed

+68
-20
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
title: Encoded PowerShell Command Line Usage of ConvertTo-SecureString
2+
id: 74403157-20f5-415d-89a7-c505779585cf
3+
status: test
4+
description: Detects specific encoding method of cOnvErTTO-SECUreStRIng in the PowerShell command lines
5+
author: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton
6+
references:
7+
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=65
8+
date: 2020/10/11
9+
modified: 2022/06/30
10+
logsource:
11+
category: process_creation
12+
product: windows
13+
detection:
14+
selection:
15+
Image|endswith: '\powershell.exe'
16+
CommandLine|contains: 'ConvertTo-SecureString'
17+
condition: selection
18+
falsepositives:
19+
- Unlikely
20+
level: high
21+
tags:
22+
- attack.defense_evasion
23+
- attack.t1027
24+
- attack.execution
25+
- attack.t1059.001

rules/windows/process_creation/proc_creation_win_powershell_cmdline_specific_comb_methods.yml

+14-20
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,20 @@
11
title: Encoded PowerShell Command Line
22
id: cdf05894-89e7-4ead-b2b0-0a5f97a90f2f
33
status: test
4+
related:
5+
- id: 5b572dcf-254b-425c-a8c5-d9af6bea35a6
6+
type: similar
47
description: Detects specific combinations of encoding methods in the PowerShell command lines
5-
author: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community
8+
author: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton
69
references:
710
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=65
811
date: 2020/10/11
9-
modified: 2021/11/27
12+
modified: 2022/07/06
1013
logsource:
1114
category: process_creation
1215
product: windows
1316
detection:
14-
selection1:
15-
Image|endswith: '\powershell.exe'
16-
CommandLine|contains|all:
17-
- 'char'
18-
- 'join'
19-
selection2:
17+
selection_to_1:
2018
Image|endswith: '\powershell.exe'
2119
CommandLine|contains:
2220
- 'ToInt'
@@ -25,29 +23,25 @@ detection:
2523
- 'ToUint'
2624
- 'ToSingle'
2725
- 'ToSByte'
28-
selection3:
29-
Image|endswith: '\powershell.exe'
26+
selection_to_2:
3027
CommandLine|contains:
3128
- 'ToChar'
3229
- 'ToString'
3330
- 'String'
34-
selection4:
31+
selection_gen_1:
3532
Image|endswith: '\powershell.exe'
3633
CommandLine|contains|all:
37-
- 'split'
34+
- 'char'
3835
- 'join'
39-
selection5:
36+
selection_gen_2:
4037
Image|endswith: '\powershell.exe'
4138
CommandLine|contains|all:
42-
- 'ForEach'
43-
- 'Xor'
44-
selection6:
45-
Image|endswith: '\powershell.exe'
46-
CommandLine|contains: 'cOnvErTTO-SECUreStRIng'
47-
condition: (selection2 and selection3) or selection1 or selection4 or selection5 or selection6
39+
- 'split'
40+
- 'join'
41+
condition: all of selection_to_* or 1 of selection_gen_*
4842
falsepositives:
4943
- Unlikely
50-
level: medium
44+
level: low
5145
tags:
5246
- attack.defense_evasion
5347
- attack.t1027
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
title: Suspicious Encoded PowerShell Command Line
2+
id: 5b572dcf-254b-425c-a8c5-d9af6bea35a6
3+
status: test
4+
related:
5+
- id: cdf05894-89e7-4ead-b2b0-0a5f97a90f2f
6+
type: similar
7+
description: Detects specific combinations of encoding methods in the PowerShell command lines
8+
author: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton
9+
references:
10+
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=65
11+
date: 2022/07/06
12+
logsource:
13+
category: process_creation
14+
product: windows
15+
detection:
16+
selection:
17+
Image|endswith: '\powershell.exe'
18+
CommandLine|contains|all:
19+
- 'ForEach'
20+
- 'Xor'
21+
condition: selection
22+
falsepositives:
23+
- Unlikely
24+
level: medium
25+
tags:
26+
- attack.defense_evasion
27+
- attack.t1027
28+
- attack.execution
29+
- attack.t1059.001

0 commit comments

Comments
 (0)