mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 01:45:21 +00:00
WScript/CScript Dropper
This commit is contained in:
parent
004fed24e0
commit
c7cc2a00d3
25
rules/windows/sysmon/sysmon_malware_script_dropper.yml
Normal file
25
rules/windows/sysmon/sysmon_malware_script_dropper.yml
Normal file
@ -0,0 +1,25 @@
|
||||
title: WScript or CScript Dropper
|
||||
status: experimental
|
||||
description: Detects wscript/cscript executions of scripts located in user directories
|
||||
author: Margaritis Dimitrios (idea), Florian Roth (rule)
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
Image:
|
||||
- '*\wscript.exe'
|
||||
- '*\cscript.exe'
|
||||
CommandLine:
|
||||
- '* C:\Users\*.jse *'
|
||||
- '* C:\Users\*.vbe *'
|
||||
- '* C:\Users\*.js *'
|
||||
- '* C:\Users\*.vba *'
|
||||
falsepositive:
|
||||
ParentImage: '*\winzip*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Winzip
|
||||
- Other self-extractors
|
||||
level: high
|
Loading…
Reference in New Issue
Block a user