Processes owned by NT AUTHORITY\SYSTEM with network calls
Unknown user accounts running PowerShell
Check for Scheduled Tasks Created by PowerShell
Purpose: Detect if powershell.exe is used to create scheduled tasks, a common persistence technique.
Check for Files Added to Temp Folder by PowerShell
Purpose: Identify suspicious files (e.g., .ps1, .exe, .dll) created in the Temp folder, potentially by PowerShell.
Check for Files Added to AppData Folder by PowerShell
Purpose: Detect suspicious files in the AppData folder, a common drop location for PowerShell-dropped malware.
Hunt for Other Files Created by PowerShell
Purpose: Identify new files created system-wide (outside Temp/AppData) that might be PowerShell-related.
Hunt for PowerShell Activity in Event Logs
Purpose: Detect suspicious PowerShell commands (e.g., Invoke-Expression, DownloadString) that might indicate file creation or task scheduling.
Hunt for PowerShell Interaction with WMI
Purpose: check if powershell.exe is running, interacting with WMI, or calling WMI classes
Hunt for Newly Created User Accounts
Purpose: Identify recently created user accounts in Active Directory to detect potential malicious activity (e.g., unauthorized account creation for persistence or lateral movement) for threat hunting.
Hunt for int process of Network Connection
Purpose: Identify processes with anomalous network connections (e.g., spoofed IPs, unexpected outbound traffic, or impersonated system services) to detect potential malware or lateral movement.