Files
blue-team-tools/rules/windows/network_connection/net_connection_win_script.yml
T

25 lines
749 B
YAML
Raw Normal View History

2022-08-28 11:16:24 +02:00
title: Script Initiated Connection
id: 08249dc0-a28d-4555-8ba5-9255a198e08c
status: experimental
2022-08-28 11:35:03 +02:00
description: Detects a script interpreter wscript/cscript opening a network connection. Adversaries may use script to download malicious payloads.
2022-08-28 11:16:24 +02:00
references:
- https://github.com/redcanaryco/atomic-red-team/blob/28d190330fe44de6ff4767fc400cc10fa7cd6540/atomics/T1105/T1105.md
2022-10-26 09:42:26 +02:00
author: frack113
2022-08-28 11:16:24 +02:00
date: 2022/08/28
2022-10-26 09:42:26 +02:00
tags:
- attack.command_and_control
- attack.t1105
2022-08-28 11:16:24 +02:00
logsource:
category: network_connection
product: windows
detection:
selection:
Initiated: 'true'
2022-10-26 09:42:26 +02:00
Image|endswith:
2022-08-28 11:16:24 +02:00
- '\wscript.exe'
- '\cscript.exe'
condition: selection
falsepositives:
2022-08-28 11:35:03 +02:00
- Legitimate scripts
2022-08-28 11:16:24 +02:00
level: medium