Potential PowerShell HackTool Script by Author
editPotential PowerShell HackTool Script by Author
editDetects known PowerShell offensive tooling author’s name in PowerShell scripts. Attackers commonly use out-of-the-box offensive tools without modifying the code, which may still contain the author artifacts. This rule identifies common author handles found in popular PowerShell scripts used for red team exercises.
Rule type: query
Rule indices:
- winlogbeat-*
- logs-windows.powershell*
Severity: high
Risk score: 73
Runs every: 5m
Searches indices from: now-9m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References:
Tags:
- Domain: Endpoint
- OS: Windows
- Use Case: Threat Detection
- Tactic: Execution
- Data Source: PowerShell Logs
Version: 104
Rule authors:
- Elastic
Rule license: Elastic License v2
Setup
editSetup
The PowerShell Script Block Logging logging policy must be enabled. Steps to implement the logging policy with Advanced Audit Configuration:
Computer Configuration > Administrative Templates > Windows PowerShell > Turn on PowerShell Script Block Logging (Enable)
Steps to implement the logging policy via registry:
reg add "hklm\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" /v EnableScriptBlockLogging /t REG_DWORD /d 1
Rule query
edithost.os.type:windows and event.category:process and powershell.file.script_block_text : ( "mattifestation" or "JosephBialek" or "harmj0y" or "ukstufus" or "SecureThisShit" or "Matthew Graeber" or "secabstraction" or "mgeeky" or "oddvarmoe" or "am0nsec" or "obscuresec" or "sixdub" or "darkoperator" or "funoverip" or "rvrsh3ll" or "kevin_robertson" or "dafthack" or "r4wd3r" or "danielhbohannon" or "OneLogicalMyth" or "cobbr_io" or "xorrior" or "PetrMedonos" or "citronneur" or "eladshamir" or "RastaMouse" or "enigma0x3" or "FuzzySec" or "424f424f" or "jaredhaight" or "fullmetalcache" or "Hubbl3" or "curi0usJack" or "Cx01N" or "itm4n" or "nurfed1" or "cfalta" or "Scott Sutherland" or "_nullbind" or "_tmenochet" or "jaredcatkinson" or "ChrisTruncer" or "monoxgas" or "TheRealWover" or "splinter_code" )
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Execution
- ID: TA0002
- Reference URL: https://attack.mitre.org/tactics/TA0002/
-
Technique:
- Name: Command and Scripting Interpreter
- ID: T1059
- Reference URL: https://attack.mitre.org/techniques/T1059/
-
Sub-technique:
- Name: PowerShell
- ID: T1059.001
- Reference URL: https://attack.mitre.org/techniques/T1059/001/