kqlElastic-2.0from elastic/detection-rules
PowerShell Script with Token Impersonation Capabilities
Quality
92
FP risk
—
Forks
0
Views
0
Rule sourcerules/windows/privilege_escalation_posh_token_impersonation.toml
event.category:process and host.os.type:windows and
powershell.file.script_block_text:(
"Invoke-TokenManipulation" or
"ImpersonateNamedPipeClient" or
"NtImpersonateThread" or
(
"STARTUPINFOEX" and
"UpdateProcThreadAttribute"
) or
(
"AdjustTokenPrivileges" and
"SeDebugPrivilege"
) or
(
("DuplicateToken" or
"DuplicateTokenEx") and
("SetThreadToken" or
"ImpersonateLoggedOnUser" or
"CreateProcessWithTokenW" or
"CreatePRocessAsUserW" or
"CreateProcessAsUserA")
)
) and
not (
user.id:("S-1-5-18" or "S-1-5-19" or "S-1-5-20") and
file.directory: "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\Downloads"
) and
not powershell.file.script_block_text : (
"sentinelbreakpoints" and "Set-PSBreakpoint" and "PowerSploitIndicators"
) and
not (
powershell.file.script_block_text : "New-HPPrivateToastNotificationLogo" and
file.path : "C:\Program Files\HPConnect\hp-cmsl-wl\modules\HP.Notifications\HP.Notifications.psm1"
)