Rules: Malicious PowerShell Invoke Commands
Detects Commandlet names from well-known PowerShell exploitation frameworks.
Detail | Value |
---|---|
Type | Templated Match |
Category | Execution |
Apply Risk to Entities | user_username, device_hostname, device_ip |
Signal Name | Malicious PowerShell Invoke Commands |
Summary Expression | Powershell executed exploitation commandlet on host: {{device_hostname}} |
Score/Severity | Static: 3 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0002, _mitreAttackTactic:TA0006, _mitreAttackTechnique:T1003, _mitreAttackTechnique:T1003.001, _mitreAttackTechnique:T1003.002, _mitreAttackTechnique:T1003.003, _mitreAttackTechnique:T1003.004, _mitreAttackTechnique:T1003.005, _mitreAttackTechnique:T1003.006, _mitreAttackTechnique:T1059, _mitreAttackTechnique:T1059.003, _mitreAttackTechnique:T1059.001, _mitreAttackTechnique:T1134, _mitreAttackTechnique:T1134.001, _mitreAttackTechnique:T1134.002, _mitreAttackTechnique:T1134.003 |
Origin | Field |
---|---|
Normalized Schema | baseImage |
Normalized Schema | commandLine |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | user_username |