
Summary
This detection rule identifies potentially malicious script executions originating from temporary folders on Windows systems, which can be indicative of various exploit techniques used by threat actors. It specifically monitors the creation of processes that utilize scripts like PowerShell, MSHTA, WScript, or CScript. By filtering for command line arguments that include temp directory paths commonly associated with script execution, the rule aims to catch unauthorized or suspicious behavior typical in cyber attacks. The detection logic involves checking for process executions where script files are run from locations such as 'C:\Windows\Temp' or various user-specific temporary directories. The detection uses a narrow filter to minimize false positives but allows for the flagging of behaviors that could be a sign of script-based malware deployment or unauthorized administrative scripts that are not flagged by known baselines. Given recent trends in exploitations leveraging system vulnerabilities, monitoring this script execution behavior becomes critical in maintaining security posture.
Categories
- Endpoint
- Windows
- Infrastructure
Data Sources
- Process
- Script
Created: 2021-07-14