Category: PowerShell
Description: Scheduled task contains encoded PowerShell command (common LOTL technique).
Evidence:
Task: LOT-Squatch-Test-Task Arguments: -EncodedCommand VwByAGkAdABlAC0ASABvAHMAdAAgACcAVABlAHMAdAAgAHQAYQBzAGsAIAByAHUAbgBuAGkAbgBnACcA
Remediation: Review scheduled task 'LOT-Squatch-Test-Task' for legitimacy. Remove if suspicious.
Category: PowerShell
Description: Registry run key contains encoded PowerShell command.
Evidence:
Registry: HKCU:\Software\Microsoft\Windows\CurrentVersion\Run\LOT-Squatch-Test Value: powershell.exe -Command Write-Host 'Test registry entry'
Remediation: Review registry entry and remove if suspicious.
Category: LOLBAS
Description: PowerShell history contains command matching known LOLBAS pattern.
Evidence:
Command: certutil -decode encoded.txt decoded.txt
Remediation: Review PowerShell history and investigate command context.
Category: Process
Description: powershell.exe spawned by svchost.exe (unusual parent).
Evidence:
Process: powershell.exe (PID: 1234) Parent: svchost.exe (PID: 567)
Remediation: Investigate process and parent relationship.
| Property | Value |
|---|---|
| Computer Name | TEST-PC-01 |
| User Name | Administrator |
| OS Version | Microsoft Windows 10 Pro (10.0.19045) |
| PowerShell Version | 5.1.19041.1234 |
| Scan Time | 2026-02-22 06:45:00 |
| Scan Depth | Basic |
General LOTL Remediation Steps:
Note: This tool provides detection only. Always validate findings before taking action.