Potential Suspicious PowerShell Keywords

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects potentially suspicious keywords that could indicate the use of a PowerShell exploitation framework

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "PowerShell Script Block Logged" AND SCRIPTEXECUTED contains "System.Reflection.Assembly.Load($,[System.Reflection.Assembly]::Load($,[Reflection.Assembly]::Load($,System.Reflection.AssemblyName,Reflection.Emit.AssemblyBuilderAccess,Reflection.Emit.CustomAttributeBuilder,Runtime.InteropServices.UnmanagedType,Runtime.InteropServices.DllImportAttribute,SuspendThread,rundll32" select Action1.HOSTNAME,Action1.MESSAGE,Action1.SCRIPTEXECUTED

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems), Perez Diego (@darkquassar), Tuan Le (NCSGroup)