
Summary
This detection rule is designed to identify the execution of the `Pubprn.vbs` script, a Microsoft-signed Visual Basic script that can be misused for executing commands on Windows systems. The rule operates by monitoring process creation events where the command line contains both the script path (\pubprn.vbs) and the 'script:' prefix. This technique leverages the ability of the script to execute underlying commands, making it a potential vector for attackers seeking to bypass traditional security controls. Its identification falls under the 'defense evasion' tactics, where the usage of such scripts can facilitate malicious activities by circumventing more standard detection methods. Ensuring the proper monitoring of this script's execution can play a crucial role in securing environments against script-based attack vectors.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-05-28