SigmaHQ/rules/windows/process_creation/win_susp_script_execution.yml
2019-11-12 23:12:27 +01:00

29 lines
732 B
YAML

title: WSF/JSE/JS/VBA/VBE File Execution
id: 1e33157c-53b1-41ad-bbcc-780b80b58288
status: experimental
description: Detects suspicious file execution by wscript and cscript
author: Michael Haag
tags:
- attack.execution
- attack.t1064
logsource:
category: process_creation
product: windows
detection:
selection:
Image:
- '*\wscript.exe'
- '*\cscript.exe'
CommandLine:
- '*.jse'
- '*.vbe'
- '*.js'
- '*.vba'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Will need to be tuned. I recommend adding the user profile path in CommandLine if it is getting too noisy.
level: medium