heroui logo

Malicious Windows Script Components File Execution by TAEF Detection

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potentially malicious activities involving the Windows Test Authoring and Execution Framework (TAEF), specifically relating to the execution of files through the 'te.exe' binary. Adversaries can leverage TAEF to execute unwanted scripts or code, such as malicious WSC files, by running 'te.exe' directly. The rule detects potentially malicious file executions by analyzing process creation events where 'te.exe' is the image being executed, either directly or as a child process of another instance of 'te.exe'. This detection is crucial in environments where the misuse of TAEF can lead to security breaches, as it can run automation scripts that may be harmful. False positives may arise from legitimate usages of 'te.exe' that are common in testing scenarios, which are important to consider when interpreting alerts raised by this rule.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2020-10-13