
Summary
This detection rule identifies the execution of script interpreters (cscript.exe and wscript.exe) that are initiated by cmd.exe, which is a key behavior to monitor for potential script-based attacks. The use of command line interfaces (CLI) such as cmd.exe to launch these interpreters may signify malicious activity, as they can be employed to run scripts for various purposes, including privilege escalation, persistence, or executing unintended commands that might compromise the security of the environment. The detection mechanism leverages data gathered from Endpoint Detection and Response (EDR) systems, focusing on processes and their parent processes logged in the Endpoint data model (particularly Sysmon and Windows event logs). Thus, any observed instances where cmd.exe is the parent process of script interpreters should be scrutinized as they could represent significant security threats pending further investigation.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Service
- Application Log
ATT&CK Techniques
- T1059
- T1059.003
Created: 2024-11-13