heroui logo

Windows Script Executing PowerShell

Elastic Detection Rules

View Source
Summary
This detection rule identifies instances where a PowerShell process is spawned by either cscript.exe or wscript.exe, which are Windows Script Host components. The spawning of PowerShell from these parent scripts may indicate malicious behavior, as adversaries often utilize Windows scripting to execute PowerShell payloads, potentially leading to unauthorized access or the execution of harmful commands. The rule specifically looks for process creation events (`start` type) within a designated timeframe and employs an exclusion clause to filter out specific benign instances related to legitimate script executions. The accompanying triage guidance advises on how to investigate such occurrences, including examining process chains for suspicious activity, analyzing commands executed by PowerShell and potential malware identification, and outlining incident response actions. The rule emphasizes the importance of discerning between benign and malicious use of scripting tools, making this detection critical for security monitoring on Windows systems.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • User Account
  • Network Share
ATT&CK Techniques
  • T1566
  • T1566.001
  • T1059
  • T1059.001
  • T1059.005
Created: 2020-02-18