Skip to content
This repository has been archived by the owner on Nov 16, 2023. It is now read-only.

Latest commit

 

History

History
59 lines (45 loc) · 2.91 KB

powercat-download.md

File metadata and controls

59 lines (45 loc) · 2.91 KB

Powercat exploitation tool downloaded

This query was originally published in the threat analytics report, "Exchange Server zero-days exploited in the wild".

In early March 2021, Microsoft released patches for four different zero-day vulnerabilities affecting Microsoft Exchange Server. The vulnerabilities were being used in a coordinated attack. For more information on the vulnerabilities, visit the following links:

The following query detects downloads of powercat, an exploitation tool for PowerShell. Although associated with these zero-day attacks, powercat is a multi-purpose tool that is also used by other groups of attackers.

More queries related to this threat can be found under the See also section of this page.

Query

DeviceProcessEvents | where FileName has_any ("cmd.exe", "powershell.exe", "PowerShell_ISE.exe") | where ProcessCommandLine endswith "powercat.ps1"

Category

This query can be used to detect the following attack techniques and tactics (see MITRE ATT&CK framework) or security configuration states.

Technique, tactic, or state Covered? (v=yes) Notes
Initial access
Execution v
Persistence
Privilege escalation
Defense evasion
Credential Access
Discovery v
Lateral movement
Collection
Command and control
Exfiltration v
Impact
Vulnerability
Exploit
Misconfiguration
Malware, component v
Ransomware

See also

Contributor info

Contributor: Microsoft 365 Defender team