Unusual process accessed the PowerShell history file

Cortex XDR Analytics Alert Reference by data source

Last date published
2024-04-15
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Command and Scripting Interpreter: PowerShell (T1059.001)

Severity

Informational

Description

An abnormal process accessed the PowerShell console history file.
This may be a sign of malicious PowerShell execution without directly invoking the powershell.exe binary.

Attacker's Goals

An attacker is attempting to run PowerShell without powershell.exe to evade detection.

Investigative actions

  • Investigate the process and command line executed and whether it's benign or normal for this host.