SigmaHQ/rules/windows/process_creation/win_malware_script_dropper.yml

42 lines
1.1 KiB
YAML
Raw Normal View History

title: WScript or CScript Dropper
2019-11-12 22:12:27 +00:00
id: cea72823-df4d-4567-950c-0b579eaf0846
status: experimental
description: Detects wscript/cscript executions of scripts located in user directories
2020-11-27 18:30:53 +00:00
author: Margaritis Dimitrios (idea), Florian Roth (rule), oscd.community
date: 2019/01/16
modified: 2020/09/01
tags:
- attack.execution
2020-06-16 20:46:08 +00:00
- attack.t1059.005
- attack.t1059.007
- attack.defense_evasion # an old one
- attack.t1064 # an old one
2020-12-01 01:12:53 +00:00
logsource:
category: process_creation
2020-12-01 01:08:52 +00:00
product: windows
detection:
2020-11-27 18:30:53 +00:00
selection1:
2020-10-15 21:04:48 +00:00
Image|endswith:
- '\wscript.exe'
- '\cscript.exe'
CommandLine|contains:
2020-11-27 18:30:53 +00:00
- 'C:\Users\'
- 'C:\ProgramData\'
selection2:
CommandLine|contains:
- '.jse'
- '.vbe'
- '.js'
- '.vba'
- '.vbs'
falsepositive:
2020-10-15 21:04:48 +00:00
ParentImage|contains: '\winzip'
2020-11-27 18:30:53 +00:00
condition: selection1 and selection2 and not falsepositive
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Winzip
- Other self-extractors
level: high