heroui logo

Vbscript Execution Using Wscript App

Splunk Security Content

View Source
Summary
The rule detects the execution of VBScript using the wscript.exe application, which is atypical since VBScript is generally executed with cscript.exe. This detection is critical as it may indicate attackers trying to evade monitoring systems and execute malicious code. By monitoring process and command-line telemetry from Endpoint Detection and Response (EDR) agents, the detection rule captures these deviations. Successful exploitation could lead to system compromise, data loss, or unauthorized lateral movement within a network. The implementation involves ingesting process-related logs that can be used to track such suspicious executions of VBScript via wscript.exe, using systems like Splunk that benefit from the normalization and modeling capabilities of the Common Information Model (CIM).
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1059.005
  • T1059
Created: 2024-11-13