Files
blue-team-tools/rules/windows/process_creation/win_susp_script_execution.yml
T

29 lines
732 B
YAML
Raw Normal View History

title: WSF/JSE/JS/VBA/VBE File Execution
2019-11-12 23:12:27 +01:00
id: 1e33157c-53b1-41ad-bbcc-780b80b58288
status: experimental
description: Detects suspicious file execution by wscript and cscript
author: Michael Haag
tags:
- attack.execution
- attack.t1064
logsource:
2019-03-02 00:14:20 +01:00
category: process_creation
product: windows
detection:
2019-03-02 00:14:20 +01:00
selection:
Image:
- '*\wscript.exe'
- '*\cscript.exe'
CommandLine:
- '*.jse'
- '*.vbe'
- '*.js'
- '*.vba'
condition: selection
fields:
2019-03-02 00:14:20 +01:00
- CommandLine
- ParentCommandLine
falsepositives:
2019-03-02 00:14:20 +01:00
- Will need to be tuned. I recommend adding the user profile path in CommandLine if it is getting too noisy.
level: medium