Use Case With elk
ELK is an open source stack that consists of three applications (Elasticsearch, Logstash and Kibana)

1- Perform a hunt for well-known PowerShell Offensive Frameworks and commands
2- Perform a hunt for suspicious parent process spawning PowerShell
3- Perform a hunt for renamed PowerShell.exe
4- Perform a hunt for base64-encoded PowerShell commands
5- Perform a hunt for PowerShell attacks utilizing GZIP compression
This query searches for events with the code 4103 from the Microsoft-Windows-PowerShell provider with opcode 5 (which indicates the use of a PowerShell script block). It then checks if the string "Content-Encoding: gzip" is present in the original field of the event, which includes the full raw message.
6- Perform a hunt for obfuscated PowerShell code using XOR
7- Perform a hunt for execution of an assembly from file by PowerShell
8- Perform a hunt for PowerShell commands downloading content
9- Perform a hunt for obfuscated PowerShell commands
Last updated