heroui logo

Legitimate Application Dropped Script

Sigma Rules

View Source
Summary
The detection rule identifies potentially malicious behavior in which legitimate Windows applications drop scripts onto the file system. Specifically, it monitors processes that are known to be benign but could be used for nefarious purposes if they write scripts to disk. The targeted applications include well-known executables such as 'eqnedt32.exe', 'wordpad.exe', 'certutil.exe', and others. The detection is configured to trigger when these applications write files with certain script file extensions, including PowerShell (.ps1), batch (.bat), VBScript (.vbs), and others. As such, this rule serves as a precautionary measure against possible code execution and defense evasion techniques that may exploit trusted applications to execute unauthorized scripts.
Categories
  • Windows
Data Sources
  • Process
  • File
Created: 2022-08-21