Files
blue-team-tools/rules/windows/sysmon/sysmon_susp_signed_script_triggered.yml
T
2019-08-28 17:30:13 +07:00

27 lines
584 B
YAML

---
action: global
title: Signed Script Proxy Execution
description: Detect suspicious signed script like PubPrn triggered for validation bypassing
author: Lep
date: 2019/08/16
tags:
- attack.execution
- attack.t1216
- attack.g0050
logsource:
product: windows
category: process_creation
detection:
selection:
ParentImage_lc: '*cscript.exe*'
condition: selection or selection2
falsepositives:
- Real PubPrn usage
level: low
---
logsource:
product: windows
service: sysmon
detection:
selection2:
CommandLine_lc: '*pubprn.vbs*'