heroui logo

MMC Loading Script Engines DLLs

Sigma Rules

View Source
Summary
This detection rule is designed to identify instances where the Microsoft Management Console (MMC) loads script engine DLLs such as vbscript.dll, jscript.dll, or jscript9.dll. The loading of these types of libraries can be indicative of malicious activity, particularly attempts to execute unauthorized scripts in a trusted process, which could be a method to circumvent application whitelisting mechanisms or evade other forms of endpoint security controls. The rule triggers when the specific image of the MMC executable (mmc.exe) is running and subsequently loads any of the aforementioned DLLs. This can raise alerts for potential misuse in the context of script execution attacks. While this rule helps in detecting potential threats, it is important to consider false positives, as legitimate use cases for the MMC might also involve loading these libraries, especially if they are part of standard operations or custom extensions.
Categories
  • Windows
  • Endpoint
  • Infrastructure
Data Sources
  • Image
  • Process
Created: 2025-02-05