Skip to content

Latest commit

 

History

History
21 lines (14 loc) · 1.87 KB

T1059.001_PowerShell.md

File metadata and controls

21 lines (14 loc) · 1.87 KB

Command and Scripting Interpreter, PowerShell [T1059.001]

Command line interface scripting has long been used to manage *nix-based systems, and the ability to build and execute scripts is often exploited by attackers. For years there was no equivalent available on Windows, and in the early 2000s MS began development of a new approach to command line management. Soon thereafter Powershell (PS) 1.0 was created. PS, in its various iterations, is a built-in tool used to automate system administration tasks and it is based on the .NET framework. It provides an interface for users to access services of the Windows operating system.

Although certain PowerShell commands are restricted by default, many commands are available to obtain system information without an executable file. Attackers can use LNK extensions to bypass safeguards and execute a PowerShell script. LNK files are usually seen as shortcuts, generally found on a user's Desktop and Start Menu.

Malicious LNK files are often embedded within what appears to be legitimate documents or pictures. Once opened, the LNK executes a legitimate windows application such as CMD.exe or MSHTA.exe to bypass security settings.

Corelight’s file extraction capabilities and integration with various intel platforms provide insight to malware obfuscated by file type. By utilizing Corelight’s built-in filtering, you can tune the file extraction parameters to target specific mime-types that are commonly used for malware delivery, including:

  • Compressed files
  • Microsoft Office (Word, PowerPoint, etc)
  • PDF files
  • TXT files (PowerShell, VBS)

Sigma Queries for Hunting

Name URL
LNK File Download or Usage over HTTP https://tdm.socprime.com/tdm/info/tggPAHEDXNm6
LNK File Download or Usage over SMB (Overview Query) https://tdm.socprime.com/tdm/info/wIed0z8aOxuN