EXPLORE
← Back to Explore
sigmamediumHunting

Windows PowerShell User Agent

Detects Windows PowerShell Web Access

MITRE ATT&CK

defense-evasioncommand-and-control

Detection Query

selection:
  c-useragent|contains: " WindowsPowerShell/"
condition: selection

Author

Florian Roth (Nextron Systems)

Created

2017-03-13

Data Sources

proxy

Tags

attack.defense-evasionattack.command-and-controlattack.t1071.001
Raw Content
title: Windows PowerShell User Agent
id: c8557060-9221-4448-8794-96320e6f3e74
status: test
description: Detects Windows PowerShell Web Access
references:
    - https://msdn.microsoft.com/powershell/reference/5.1/microsoft.powershell.utility/Invoke-WebRequest
author: Florian Roth (Nextron Systems)
date: 2017-03-13
modified: 2021-11-27
tags:
    - attack.defense-evasion
    - attack.command-and-control
    - attack.t1071.001
logsource:
    category: proxy
detection:
    selection:
        c-useragent|contains: ' WindowsPowerShell/'
    condition: selection
falsepositives:
    - Administrative scripts that download files from the Internet
    - Administrative scripts that retrieve certain website contents
level: medium