[metadata] creation_date = "2020/11/18" maturity = "production" updated_date = "2021/03/03" [rule] author = ["Elastic"] description = "Identifies script engines creating files in the startup folder, or the creation of script files in the startup folder." from = "now-9m" index = ["winlogbeat-*", "logs-endpoint.events.*", "logs-windows.*"] language = "eql" license = "Elastic License v2" name = "Persistent Scripts in the Startup Directory" risk_score = 47 rule_id = "f7c4dc5a-a58d-491d-9f14-9b66507121c0" severity = "medium" tags = ["Elastic", "Host", "Windows", "Threat Detection", "Persistence"] timestamp_override = "event.ingested" type = "eql" query = ''' file where event.type != "deletion" and user.domain != "NT AUTHORITY" and /* detect shortcuts created by wscript.exe or cscript.exe */ (file.path : "C:\\*\\Programs\\Startup\\*.lnk" and process.name : ("wscript.exe", "cscript.exe")) or /* detect vbs or js files created by any process */ file.path : ("C:\\*\\Programs\\Startup\\*.vbs", "C:\\*\\Programs\\Startup\\*.vbe", "C:\\*\\Programs\\Startup\\*.wsh", "C:\\*\\Programs\\Startup\\*.wsf", "C:\\*\\Programs\\Startup\\*.js") ''' [[rule.threat]] framework = "MITRE ATT&CK" [[rule.threat.technique]] id = "T1547" name = "Boot or Logon Autostart Execution" reference = "https://attack.mitre.org/techniques/T1547/" [[rule.threat.technique.subtechnique]] id = "T1547.001" name = "Registry Run Keys / Startup Folder" reference = "https://attack.mitre.org/techniques/T1547/001/" [rule.threat.tactic] id = "TA0003" name = "Persistence" reference = "https://attack.mitre.org/tactics/TA0003/"