Detectionmediumtest

Suspicious New-PSDrive to Admin Share

Adversaries may use to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
François HubautCreated Sat Aug 131c563233-030e-4a07-af8c-ee0490a66d3awindows
Log Source
WindowsPowerShell Script
ProductWindows← raw: windows
CategoryPowerShell Script← raw: ps_script

Definition

Requirements: Script Block Logging must be enabled

Detection Logic
Detection Logic1 selector
detection:
    selection:
        ScriptBlockText|contains|all:
            - 'New-PSDrive'
            - '-psprovider '
            - 'filesystem'
            - '-root '
            - '\\\\'
            - '$'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
1c563233-030e-4a07-af8c-ee0490a66d3a
Status
test
Level
medium
Type
Detection
Created
Sat Aug 13
Path
rules/windows/powershell/powershell_script/posh_ps_susp_new_psdrive.yml
Raw Tags
attack.lateral-movementattack.t1021.002
View on GitHub