Skip to content

Latest commit

 

History

History
20 lines (19 loc) · 440 Bytes

inmemory_load_of_hacktool-powersploit.md

File metadata and controls

20 lines (19 loc) · 440 Bytes

MDE and Sentinel

//PowerSploit in memory module loads
let iocList = dynamic ([
"powersploit",
"Win32",
"DynamicAssembly", //can cause FPs
"ReflectedDelegate",
"SSPI",
"SSPI2",
"VaultUtil",
"VSSUtil",
"BlueScreen",
"Win32"
]);
DeviceEvents
| extend module = parse_json(AdditionalFields).ModuleILPathOrName
| where ActionType =~ "ClrUnbackedModuleLoaded" and module in~ (iocList) and InitiatingProcessFileName =~ "powershell.exe"