cscli scenarios install sigmahq/proc_creation_win_powershell_susp_download_patterns
1type: trigger2name: sigmahq/proc_creation_win_powershell_susp_download_patterns3description: |4 Detects suspicious PowerShell download patterns that are often used in malicious scripts, stagers or downloaders (make sure that your backend applies the strings case-insensitive)5filter: |6 (evt.Meta.service == 'sysmon' && evt.Parsed.EventID == '1') && (evt.Parsed.CommandLine contains 'IEX ((New-Object Net.WebClient).DownloadString' || evt.Parsed.CommandLine contains 'IEX (New-Object Net.WebClient).DownloadString' || evt.Parsed.CommandLine contains 'IEX((New-Object Net.WebClient).DownloadString' || evt.Parsed.CommandLine contains 'IEX(New-Object Net.WebClient).DownloadString' || evt.Parsed.CommandLine contains ' -command (New-Object System.Net.WebClient).DownloadFile(' || evt.Parsed.CommandLine contains ' -c (New-Object System.Net.WebClient).DownloadFile(')7blackhole: 2m8#status: test9labels:10 service: windows11 confidence: 112 spoofable: 013 classification:14 - attack.t1059.0011516 label: "Suspicious PowerShell Download and Execute Pattern"17 behavior : "windows:audit"18 remediation: false1920scope:21 type: ParentProcessId22 expression: evt.Parsed.ParentProcessId2324