Detection rules › Sigma
Invoke-Obfuscation Obfuscated IEX Invocation - System
Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the code block linked in the references
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Defense Evasion | T1027 Obfuscated Files or Information |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Service-Control-Manager | 7045 |
Stages and Predicates
Stage 1: all of selection_eid
Stage 2: all of selection_imagepath
or:
ImagePath|re: '\$PSHome\[\s*\d{1,3}\s*\]\s*\+\s*\$PSHome\['
ImagePath|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\['
ImagePath|re: '\$VerbosePreference\.ToString\('
ImagePath|re: '\$env:ComSpec\[(\s*\d{1,3}\s*,){2}'
ImagePath|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\['
ImagePath|re: '\String\]\s*\$VerbosePreference'
ImagePath|re: '\\*mdr\*\W\s*\)\.Name'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
ImagePath | regex_match |
|
Neighbors
Stricter alternatives (narrower than this rule)
The rules below may be useful if you find the current rule is too noisy / lacks specificity.
- Windows Bluetooth Service Installed From Uncommon Location (adds 3 filters)
- Windows Service Created with Suspicious Service Path (adds 3 filters)
- Windows Snake Malware Service Create (adds 3 filters)
- Clop Ransomware Known Service Name (adds 2 filters)
- Windows Driver Load Non-Standard Path (adds 2 filters)
- Windows KrbRelayUp Service Creation (adds 2 filters)
- Windows Service Create RemComSvc (adds 2 filters)
- Windows Service Create SliverC2 (adds 2 filters)
- Windows Vulnerable Driver Installed (adds 2 filters)
- Malicious Powershell Executed As A Service (adds 1 filter)
- Randomly Generated Windows Service Name (adds 1 filter)
- Windows Service Created with Suspicious Service Name (adds 1 filter)
- Invoke-Obfuscation Via Use Rundll32 - System (adds 6 filters)
- Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION - System (adds 6 filters)
- Invoke-Obfuscation VAR+ Launcher - System (adds 5 filters)
- Invoke-Obfuscation COMPRESS OBFUSCATION - System (adds 5 filters)
- Invoke-Obfuscation RUNDLL LAUNCHER - System (adds 5 filters)
- Invoke-Obfuscation CLIP+ Launcher - System (adds 4 filters)
- Invoke-Obfuscation STDIN+ Launcher - System (adds 4 filters)
- Invoke-Obfuscation Via Stdin - System (adds 4 filters)
- Invoke-Obfuscation Via Use MSHTA - System (adds 3 filters)
- ProcessHacker Privilege Elevation (adds 3 filters)
- Invoke-Obfuscation Via Use Clip - System (adds 2 filters)
- Credential Dumping Tools Service Execution - System (adds 2 filters)
- Moriya Rootkit - System (adds 2 filters)
- PowerShell Scripts Installed as Services (adds 2 filters)
- Service Installed By Unusual Client - System (adds 2 filters)
- Suspicious Service Installation (adds 2 filters)
- Tap Driver Installation (adds 2 filters)
- RTCore Suspicious Service Installation (adds 2 filters)
- Service Installation in Suspicious Folder (adds 2 filters)
- CobaltStrike Service Installations - System (adds 1 filter)
- smbexec.py Service Installation (adds 1 filter)
- KrbRelayUp Service Installation (adds 1 filter)
- Meterpreter or Cobalt Strike Getsystem Service Installation - System (adds 1 filter)
- Anydesk Remote Access Software Service Installation (adds 1 filter)
- CSExec Service Installation (adds 1 filter)
- Mesh Agent Service Installation (adds 1 filter)
- NetSupport Manager Service Install (adds 1 filter)
- PAExec Service Installation (adds 1 filter)
- New PDQDeploy Service - Server Side (adds 1 filter)
- New PDQDeploy Service - Client Side (adds 1 filter)
- RemCom Service Installation (adds 1 filter)
- Remote Utilities Host Service Install (adds 1 filter)
- Sliver C2 Default Service Installation (adds 1 filter)
- PsExec Service Installation (adds 1 filter)
- TacticalRMM Service Installation (adds 1 filter)
- Uncommon Service Installation Image Path (adds 1 filter)
- Service Installation with Suspicious Folder Pattern (adds 1 filter)
- Suspicious Service Installation Script (adds 1 filter)