<<< Hide Navigation Hide TOC >>>
PowerShell DownloadFile (8f70ac5f-1f6f-4f8e-b454-db19561216c5)
Detects the execution of powershell, a WebClient object creation and the invocation of DownloadFile in a single command line
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | PowerShell DownloadFile (8f70ac5f-1f6f-4f8e-b454-db19561216c5) | Sigma-Rules | 1 |
Multi-Stage Channels - T1104 (84e02621-8fdf-470f-bd58-993bb6a89d91) | Attack Pattern | PowerShell DownloadFile (8f70ac5f-1f6f-4f8e-b454-db19561216c5) | Sigma-Rules | 1 |
PowerShell DownloadFile (8f70ac5f-1f6f-4f8e-b454-db19561216c5) | Sigma-Rules | Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) | Attack Pattern | 1 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | 2 |