Techniques
Sample rules
Malicious PowerShell Keywords
- source: sigma
- technicques:
- t1059
- t1059.001
Description
Detects keywords from well-known PowerShell exploitation frameworks
Detection logic
condition: selection
selection:
ScriptBlockText|contains:
- AdjustTokenPrivileges
- IMAGE_NT_OPTIONAL_HDR64_MAGIC
- Metasploit
- Microsoft.Win32.UnsafeNativeMethods
- Mimikatz
- MiniDumpWriteDump
- PAGE_EXECUTE_READ
- ReadProcessMemory.Invoke
- SE_PRIVILEGE_ENABLED
- SECURITY_DELEGATION
- TOKEN_ADJUST_PRIVILEGES
- TOKEN_ALL_ACCESS
- TOKEN_ASSIGN_PRIMARY
- TOKEN_DUPLICATE
- TOKEN_ELEVATION
- TOKEN_IMPERSONATE
- TOKEN_INFORMATION_CLASS
- TOKEN_PRIVILEGES
- TOKEN_QUERY