SigmaHQ/rules/windows/sysmon/sysmon_susp_script_execution.yml

26 lines
651 B
YAML
Raw Normal View History

2018-01-27 09:57:30 +00:00
title: WSF/JSE/JS/VBA/VBE File Execution
status: experimental
2017-03-16 17:58:32 +00:00
description: Detects suspicious file execution by wscript and cscript
author: Michael Haag
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
Image:
- '*\wscript.exe'
- '*\cscript.exe'
CommandLine:
- '*.jse'
- '*.vbe'
- '*.js'
- '*.vba'
condition: selection
2017-09-12 21:54:04 +00:00
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Will need to be tuned. I recommend adding the user profile path in CommandLine if it is getting too noisy.
level: medium