heroui logo

Suspicious PowerShell Execution via Windows Scripts

Elastic Detection Rules

View Source
Summary
This detection rule identifies suspicious instances of PowerShell execution originating from Windows Script Host processes, specifically cscript.exe or wscript.exe. The rule incorporates various conditions to detect potentially malicious command execution by analyzing the command line arguments, execution context, and parent process names. The aim is to catch abuse of PowerShell for executing obfuscated scripts while minimizing false positives by excluding known legitimate usage scenarios. The detection leverages logs from various sources, such as Winlogbeat, Sysmon, and Microsoft Defender, to monitor for specific execution patterns indicative of malicious activities. It employs a risk score of 73, indicating a high severity classification, making it suitable for immediate investigation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Script
  • Application Log
ATT&CK Techniques
  • T1059
  • T1059.001
  • T1059.005
Created: 2024-09-09