
Summary
This detection rule identifies potentially malicious activities by monitoring for specific Windows command line inputs that involve the use of 'Wscript', 'Shell', and 'Run'. These keywords are associated with the execution of VBScripts via the Windows Script Host, which can be exploited by attackers to automate tasks, deliver malicious payloads, or run unauthorized scripts. The presence of these keywords in a command line might suggest an attempt to leverage the Wscript Shell for potentially harmful purposes, including the execution of malware or unauthorized administrative tasks. Proper investigation is warranted when these keywords are detected, as they may indicate attempts at executing malicious code. However, some legitimate administrative or third-party uses may also trigger this rule, hence the need for further analysis.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-08-31