cscli scenarios install sigmahq/proc_creation_win_powershell_frombase64string
1type: trigger2name: sigmahq/proc_creation_win_powershell_frombase64string3description: |4 Detects usage of the "FromBase64String" function in the commandline which is used to decode a base64 encoded string5filter: |6 (evt.Meta.service == 'sysmon' && evt.Parsed.EventID == '1') && (evt.Parsed.CommandLine contains '::FromBase64String(')7blackhole: 2m8#status: test9labels:10 service: windows11 confidence: 112 spoofable: 013 classification:14 - attack.t102715 - attack.t114016 - attack.t1059.0011718 label: "Base64 Encoded PowerShell Command Detected"19 behavior : "windows:audit"20 remediation: false2122scope:23 type: ParentProcessId24 expression: evt.Parsed.ParentProcessId2526