Usage Of Web Request Commands And Cmdlets - ScriptBlock

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects the use of various web request commands with commandline tools and Windows PowerShell cmdlets (including aliases) via PowerShell scriptblock logs

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "PowerShell Script Block Logged" AND SCRIPTEXECUTED contains "[System.Net.WebRequest]::create,curl ,Invoke-RestMethod,Invoke-WebRequest, irm ,iwr ,Net.WebClient,Resume-BitsTransfer,Start-BitsTransfer,wget ,WinHttp.WinHttpRequest" AND SCRIPTPATH notstartswith "C:\Packages\Plugins\Microsoft.GuestConfiguration.ConfigurationforWindows" select Action1.HOSTNAME,Action1.MESSAGE,Action1.SCRIPTEXECUTED

Detection

Execution Mode

realtime

Log Sources

Windows

Author

James Pemberton / @4A616D6573