Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMPowershellDownloads.yaml (25 lines of code) (raw):

id: 576cac40-d6f5-4ef9-9c3d-013b94656bea name: CyberArkEPM - Powershell downloads description: | 'Query shows powershell downloads.' severity: Medium requiredDataConnectors: - connectorId: CyberArkEPM dataTypes: - CyberArkEPM tactics: - Execution relevantTechniques: - T1204 - T1059 query: | CyberArkEPM | where TimeGenerated > ago(24h) | where ActingProcessFileInternalName =~ 'powershell.exe' | where ActingProcessCommandLine has_any ('WebClient', 'DownloadString', 'DownloadFile') | extend AccountCustomEntity = ActorUsername entityMappings: - entityType: Account fieldMappings: - identifier: Name columnName: AccountCustomEntity