Techniques
Sample rules
PowerShell PSReflect Script
- source: elastic
- technicques:
- T1059
- T1106
Description
Detects the use of PSReflect in PowerShell scripts. Attackers leverage PSReflect as a library that enables PowerShell to access win32 API functions.
Detection logic
event.category:process and host.os.type:windows and
powershell.file.script_block_text:(
"New-InMemoryModule" or
"Add-Win32Type" or
psenum or
DefineDynamicAssembly or
DefineDynamicModule or
"Reflection.TypeAttributes" or
"Reflection.Emit.OpCodes" or
"Reflection.Emit.CustomAttributeBuilder" or
"Runtime.InteropServices.DllImportAttribute"
) and
not user.id : "S-1-5-18"