Suspicious PowerShell Download and Execute Pattern

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects suspicious PowerShell download patterns that are often used in malicious scripts, stagers or downloaders (make sure that your backend applies the strings case-insensitive)

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND COMMANDLINE contains "IEX ((New-Object Net.WebClient).DownloadString,IEX (New-Object Net.WebClient).DownloadString,IEX((New-Object Net.WebClient).DownloadString,IEX(New-Object Net.WebClient).DownloadString, -command (New-Object System.Net.WebClient).DownloadFile(, -c (New-Object System.Net.WebClient).DownloadFile(" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems)