Skip to content

Commit 9d1b5b0

Browse files
authored
Update windows_powershell_script_block_with_malicious_string.yml
1 parent c612c9a commit 9d1b5b0

File tree

1 file changed

+12
-13
lines changed

1 file changed

+12
-13
lines changed

detections/endpoint/windows_powershell_script_block_with_malicious_string.yml

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -36,25 +36,25 @@ drilldown_searches:
3636
search: '`powershell` ScriptBlockText EventCode=4104 Computer=$dest|s$ "*$match$*"'
3737
earliest_offset: $info_min_time$
3838
latest_offset: $info_max_time$
39+
rba:
40+
message: The user $user$ ran a known malicious PowerShell string matching *$match$* on $dest$
41+
risk_objects:
42+
- field: user
43+
type: user
44+
score: 70
45+
- field: dest
46+
type: system
47+
score: 70
48+
threat_objects:
49+
- field: signature_id
50+
type: signature_id
3951
tags:
4052
analytic_story:
4153
- Malicious PowerShell
4254
asset_type: Endpoint
43-
confidence: 90
44-
impact: 80
45-
message: The user $user$ ran a known malicious PowerShell string matching *$match$* on $dest$
4655
mitre_attack_id:
4756
- T1059
4857
- T1059.001
49-
observable:
50-
- name: dest
51-
type: Hostname
52-
role:
53-
- Victim
54-
- name: user
55-
type: User
56-
role:
57-
- Victim
5858
product:
5959
- Splunk Enterprise
6060
- Splunk Enterprise Security
@@ -64,7 +64,6 @@ tags:
6464
- Computer
6565
- EventCode
6666
- ScriptBlockText
67-
risk_score: 72
6867
security_domain: threat
6968
tests:
7069
- name: True Positive Test

0 commit comments

Comments
 (0)