Skip to content

Commit f6832c6

Browse files
authored
Apply suggestions from code review
1 parent 4a58ea1 commit f6832c6

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

detections/endpoint/windows_powershell_fakecaptcha_clipboard_execution.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Windows PowerShell FakeCAPTCHA Clipboard Execution
22
id: d81d4d3d-76b5-4f21-ab51-b17d5164c106
3-
version: 2
3+
version: 1
44
date: '2025-05-14'
55
author: Michael Haag, Splunk
66
status: production
@@ -12,7 +12,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1212
as lastTime FROM datamodel=Endpoint.Processes where `process_powershell`
1313
AND Processes.process="*-w*h*"
1414
AND (
15-
(Processes.process IN ("*robot*", "*captcha*", "*CAPTCHA*", "*verify*", "*security check*", "*complete verification*"))
15+
(Processes.process IN ("*robot*", "*captcha*", "*verify*", "*security check*", "*complete verification*"))
1616
OR
1717
(
1818
(Processes.process IN ("*iwr *", "*Invoke-WebRequest*", "*wget *", "*curl *", "*Net.WebClient*", "*DownloadString*", "*[Convert]::FromBase64String*"))
@@ -39,7 +39,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
3939
| `security_content_ctime(lastTime)`
4040
| `windows_powershell_fakecaptcha_clipboard_execution_filter`'
4141
how_to_implement: To successfully implement this search, you need to be ingesting logs with the process name, process path, and command-line executions from your endpoints. If you are using Sysmon, you must have at least Sysmon version 6.0.4 with EventID 1 configured. The full command line arguments are necessary for proper detection.
42-
known_false_positives: Legitimate PowerShell commands that use hidden windows for automation tasks may trigger this detection. The search specifically looks for patterns typical of FakeCAPTCHA campaigns. You may need to add additional exclusions for legitimate administrative activities in your environment by modifying the lookup file or creating an exclusions list in the filter macro.
42+
known_false_positives: Legitimate PowerShell commands that use hidden windows for automation tasks may trigger this detection. The search specifically looks for patterns typical of FakeCAPTCHA campaigns. You may need to add additional exclusions for legitimate administrative activities in your environment by modifying the filter macro.
4343
references:
4444
- https://urlhaus.abuse.ch/
4545
- https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape

0 commit comments

Comments
 (0)