技能 编程开发 可疑PowerShell执行检测

可疑PowerShell执行检测

v20260317
detecting-suspicious-powershell-execution
通过 EDR 与 SIEM 端到端数据定位编码命令、宏启动下载桥接、AMSI 绕过和受限语言逃逸等可疑 PowerShell 执行行为,将结果映射到 MITRE T1059,辅助主动威胁狩猎与响应。
获取技能
347 次下载
概览

Detecting Suspicious Powershell Execution

When to Use

  • When proactively hunting for indicators of detecting suspicious powershell execution in the environment
  • After threat intelligence indicates active campaigns using these techniques
  • During incident response to scope compromise related to these techniques
  • When EDR or SIEM alerts trigger on related indicators
  • During periodic security assessments and purple team exercises

Prerequisites

  • EDR platform with process and network telemetry (CrowdStrike, MDE, SentinelOne)
  • SIEM with relevant log data ingested (Splunk, Elastic, Sentinel)
  • Sysmon deployed with comprehensive configuration
  • Windows Security Event Log forwarding enabled
  • Threat intelligence feeds for IOC correlation

Workflow

  1. Formulate Hypothesis: Define a testable hypothesis based on threat intelligence or ATT&CK gap analysis.
  2. Identify Data Sources: Determine which logs and telemetry are needed to validate or refute the hypothesis.
  3. Execute Queries: Run detection queries against SIEM and EDR platforms to collect relevant events.
  4. Analyze Results: Examine query results for anomalies, correlating across multiple data sources.
  5. Validate Findings: Distinguish true positives from false positives through contextual analysis.
  6. Correlate Activity: Link findings to broader attack chains and threat actor TTPs.
  7. Document and Report: Record findings, update detection rules, and recommend response actions.

Key Concepts

Concept Description
T1059.001 PowerShell
T1059.003 Windows Command Shell
T1562.001 Disable or Modify Tools

Tools & Systems

Tool Purpose
CrowdStrike Falcon EDR telemetry and threat detection
Microsoft Defender for Endpoint Advanced hunting with KQL
Splunk Enterprise SIEM log analysis with SPL queries
Elastic Security Detection rules and investigation timeline
Sysmon Detailed Windows event monitoring
Velociraptor Endpoint artifact collection and hunting
Sigma Rules Cross-platform detection rule format

Common Scenarios

  1. Scenario 1: Base64 encoded PowerShell command launched by macro document
  2. Scenario 2: IEX download cradle fetching payload from C2 server
  3. Scenario 3: AMSI bypass via reflection patching before payload execution
  4. Scenario 4: PowerShell Empire agent communicating with C2

Output Format

Hunt ID: TH-DETECT-[DATE]-[SEQ]
Technique: T1059.001
Host: [Hostname]
User: [Account context]
Evidence: [Log entries, process trees, network data]
Risk Level: [Critical/High/Medium/Low]
Confidence: [High/Medium/Low]
Recommended Action: [Containment, investigation, monitoring]
信息
Category 编程开发
Name detecting-suspicious-powershell-execution
版本 v20260317
大小 15.15KB
更新时间 2026-03-18
语言