Microsoft-Windows-PowerShell › Event 4103

Event ID 4103 — Payload Context: ContextInfo User Data: UserData.

Provider
Microsoft-Windows-PowerShell
Channel
Operational
Level
Informational
Collection Priority
Recommended (Yamato Security, others)
Task
None
Opcode
Tobeusedwhenanexceptionisraised

Message #

%3

Context:
%1

User Data:
%2

Fields #

NameDescription
ContextInfo UnicodeStringContext
UserData UnicodeString
Payload UnicodeString

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-PowerShell",
    "guid": "A0C1853B-5C40-4B15-8766-3CF1C58F985A",
    "event_source_name": "",
    "event_id": 4103,
    "version": 1,
    "level": 4,
    "task": 106,
    "opcode": 20,
    "keywords": 0,
    "time_created": "2023-11-06T01:35:06.007359+00:00",
    "event_record_id": 907,
    "correlation": {
      "ActivityID": "E4DB489E-1037-0000-CD79-E9E43710DA01"
    },
    "execution": {
      "process_id": 15468,
      "thread_id": 15184
    },
    "channel": "Microsoft-Windows-PowerShell/Operational",
    "computer": "WinDev2310Eval",
    "security": {
      "user_id": "S-1-5-21-1992711665-1655669231-58201500-1000"
    }
  },
  "event_data": {
    "ContextInfo": "        Severity = Informational\r\n        Host Name = ConsoleHost\r\n        Host Version = 5.1.22621.2428\r\n        Host ID = 9500ad9e-7709-413f-b91b-8945cbb52940\r\n        Host Application = powershell.exe -NoExit -Command &{Import-Module \"C:\\Program Files\\Microsoft Visual Studio\\2022\\Community\\Common7\\Tools\\Microsoft.VisualStudio.DevShell.dll\"; Enter-VsDevShell d5dcd421 -SkipAutomaticLocation -DevCmdArguments \"-arch=x64 -host_arch=x64\"}\r\n        Engine Version = 5.1.22621.2428\r\n        Runspace ID = 6fa4bb48-d600-4d4b-b445-e1fa0a41db53\r\n        Pipeline ID = 23\r\n        Command Name = Set-StrictMode\r\n        Command Type = Cmdlet\r\n        Script Name = C:\\Program Files\\WindowsPowerShell\\Modules\\PSReadLine\\2.0.0\\PSReadLine.psm1\r\n        Command Path = \r\n        Sequence Number = 58\r\n        User = WINDEV2310EVAL\\User\r\n        Connected User = \r\n        Shell ID = Microsoft.PowerShell\r\n",
    "UserData": "",
    "Payload": "CommandInvocation(Set-StrictMode): \"Set-StrictMode\"\r\nParameterBinding(Set-StrictMode): name=\"Off\"; value=\"True\"\r\n"
  },
  "message": ""
}

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

Show 17 more (33 total)

References #