Techniques
Sample rules
PowerShell PSReflect Script
- source: elastic
- technicques:
- T1059
- T1106
Description
Detects PowerShell scripts that implements PSReflect-style helpers (for example, Add-Win32Type, New-InMemoryModule, or DllImport patterns) for dynamic Win32 API invocation. Attackers use PSReflect to call native APIs from PowerShell for execution, injection, or privilege manipulation.
Detection logic
event.category:process and host.os.type:windows and
powershell.file.script_block_text:(
"New-InMemoryModule" or
"Add-Win32Type" or
psenum or
DefineDynamicAssembly or
DefineDynamicModule or
"Reflection.TypeAttributes" or
"Reflection.Emit.OpCodes" or
"Reflection.Emit.CustomAttributeBuilder" or
"Runtime.InteropServices.DllImportAttribute"
) and
not user.id : "S-1-5-18"