Detection Query 1 | (((resourcename in ("Sysmon") AND eventtype = "1") AND image IN ("\powershell.exe","\pwsh.exe")) AND originalfilename IN ("PowerShell.EXE","pwsh.dll")) AND commandline IN (".githubusercontent.com","anonfiles.com","cdn.discordapp.com","ddns.net","dl.dropboxusercontent.com","ghostbin.co","glitch.me","gofile.io","hastebin.com","mediafire.com","mega.nz","onrender.com","pages.dev","paste.ee","pastebin.com","pastebin.pl","pastetext.net","pixeldrain.com","privatlab.com","privatlab.net","send.exploit.in","sendspace.com","storage.googleapis.com","storjshare.io","supabase.co","temp.sh","transfer.sh","trycloudflare.com","ufile.io","w3spaces.com","workers.dev",".DownloadString(",".DownloadFile(","Invoke-WebRequest","iwr","wget") |
Detection Query 2 | (((technologygroup = "EDR") AND image IN ("\powershell.exe","\pwsh.exe")) AND originalfilename IN ("PowerShell.EXE","pwsh.dll")) AND commandline IN (".githubusercontent.com","anonfiles.com","cdn.discordapp.com","ddns.net","dl.dropboxusercontent.com","ghostbin.co","glitch.me","gofile.io","hastebin.com","mediafire.com","mega.nz","onrender.com","pages.dev","paste.ee","pastebin.com","pastebin.pl","pastetext.net","pixeldrain.com","privatlab.com","privatlab.net","send.exploit.in","sendspace.com","storage.googleapis.com","storjshare.io","supabase.co","temp.sh","transfer.sh","trycloudflare.com","ufile.io","w3spaces.com","workers.dev",".DownloadString(",".DownloadFile(","Invoke-WebRequest","iwr","wget") |