heroui logo

Cscript/Wscript Uncommon Script Extension Execution

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious behavior by monitoring instances where Wscript or Cscript tools execute files with uncommon file extensions. Typically, Wscript and Cscript are associated with script execution (e.g., .vbs or .js files), thus the execution of non-script file types such as .csv, .doc, .gif, and others through these scripting engines is unusual and may indicate an attempt to execute malicious payloads disguised under legitimate file types. The rule looks specifically for process creation events that involve wscript.exe or cscript.exe, checking if either of these processes is invoked with command lines containing specific, non-common file extensions. Consequently, by outlining these criteria, the rule seeks to flag suspicious executions that may warrant further investigation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2023-05-15