Files
blue-team-tools/rules/windows/sysmon/sysmon_susp_signed_script_triggered.yml
T
2020-02-03 09:47:06 +07:00

27 lines
578 B
YAML

---
action: global
title: Signed Script Proxy Execution
description: Detect suspicious signed script like PubPrn triggered for validation bypassing
author: Lep
date: 2019/08/16
tags:
- attack.execution
- attack.t1216
- attack.g0050
logsource:
product: windows
category: process_creation
detection:
selection:
ParentImage: '*cscript.exe*'
condition: selection or selection2
falsepositives:
- Real PubPrn usage
level: low
---
logsource:
product: windows
service: sysmon
detection:
selection2:
CommandLine: '*pubprn.vbs*'