SigmaHQ/rules/windows/process_creation/win_susp_script_execution.yml

25 lines
643 B
YAML
Raw Normal View History

title: WSF/JSE/JS/VBA/VBE File Execution
status: experimental
description: Detects suspicious file execution by wscript and cscript
author: Michael Haag
logsource:
category: process_creation
product: windows
detection:
selection:
Image:
- '*\wscript.exe'
- '*\cscript.exe'
CommandLine:
- '*.jse'
- '*.vbe'
- '*.js'
- '*.vba'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Will need to be tuned. I recommend adding the user profile path in CommandLine if it is getting too noisy.
level: medium