heroui logo

Winword Spawning Windows Script Host

Splunk Security Content

View Source
Summary
This detection rule has been deprecated in favor of a more generic approach, originally designed to identify instances where Microsoft Winword.exe spawns Windows Script Host processes such as cscript.exe or wscript.exe. This behavior is notable because it is often linked to spearphishing attacks, where malicious scripts are executed through document macros. The detection relies on Endpoint Detection and Response (EDR) telemetry, specifically focusing on process creation events where the parent process is Winword.exe. If such activities are confirmed to be malicious, they could lead to code execution, allowing attackers to gain initial access and potentially execute further payloads or establish persistence in the environment.
Categories
  • Endpoint
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1566
  • T1566.001
Created: 2025-01-13