256. That's How Adversaries Abuse PowerShell Cmdlets

Hello everyone!

I've brought you another PowerShell (T1059.001) procedure you may use in your threat hunting missions! 

Let's look inside a new report on Head Mare (we track this cluster as Rainbow Hyena). The adversary downloaded archives with additional backdoors from a remote server and used PowerShell to expand it:

powershell expand-archive -force -path C:\ProgramData\YandexUpdate\update.zip -destinationpath C:\ProgramData\YandexUpdate\

The threat actors chose ProgramData as a staging folder, so we can use it to build the query and look for susoicious events:

event_type: "processcreatewin"

AND

proc_file_path: "powershell.exe"

AND

cmdline: ("expand-archive" AND "programdata")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge