Powershell Executed From Headless ConHost Process

Rule Info

Name
Powershell Executed From Headless ConHost Process
Author
Matt Anderson (Huntress)
Description
Detects the use of powershell commands from headless ConHost window. The "--headless" flag hides the windows from the user upon execution.
Date
2024-07-23 00:00:00
Modified
None
Id
056c7317-9a09-4bd4-9067-d051312752ea
Tags
attack.defense-evasion attack.t1059.001 attack.t1059.003 DEMO
Type
Community Rule

Rule History

Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
Matt Anderson
Merge PR #4919 from @MATTANDERS0N - Added new detections related BOINC
2024-07-23