Detection rules › Sigma

HackTool - WinPwn Execution - ScriptBlock

Severity
high
Author
Swachchhanda Shrawan Poudel
Source
upstream

Detects scriptblock text keywords indicative of potential usge of the tool WinPwn. A tool for Windows and Active Directory reconnaissance and exploitation.

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1106 Native API
Privilege EscalationT1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control
Defense EvasionT1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control
Credential AccessT1552.001 Unsecured Credentials: Credentials In Files, T1555 Credentials from Password Stores, T1555.003 Credentials from Password Stores: Credentials from Web Browsers
DiscoveryT1046 Network Service Discovery, T1082 System Information Discovery, T1518 Software Discovery

Event coverage

ProviderEvent IDTitle
PowerShell4104Creating Scriptblock text (MessageNumber of MessageTotal).

Stages and Predicates

Stage 1: selection

or:
ScriptBlockText|contains: Offline_Winpwn
ScriptBlockText|contains: 'WinPwn '
ScriptBlockText|contains: WinPwn.exe
ScriptBlockText|contains: WinPwn.ps1

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
ScriptBlockTextmatch
  • Offline_Winpwn
  • WinPwn
  • WinPwn.exe
  • WinPwn.ps1

Neighbors

Broader alternatives (more inclusive than this rule)

These rules match a superset of what this rule catches. They cover the same events plus more. Use them if you want wider coverage and can absorb more false positives.