heroui logo

Script Interpreter Execution From Suspicious Folder

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious script executions from suspicious directories on a Windows operating system. It focuses on popular script interpreters including cscript.exe, mshta.exe, and wscript.exe. The detection employs a multi-faceted approach, analyzing both the process creation events and command line arguments for indicators of suspicious use. Key indicators include the use of hidden execution flags, a 'bypass' Execution Policy, or usage from unusually accessible folders such as temporary directories or user profile folders associated with scripts. The combination of these conditions helps to discern legitimate script executions from those that may be part of an attack or unauthorized activity.
Categories
  • Windows
Data Sources
  • Process
Created: 2022-02-08