heroui logo

Suspicious Reconnaissance Activity Via GatherNetworkInfo.VBS

Sigma Rules

View Source
Summary
This detection rule identifies suspicious reconnaissance activity that may indicate a malicious intent by observing the execution of the built-in Windows script 'gatherNetworkInfo.vbs', which is situated in the Windows System32 directory. This script can be utilized by attackers to collect sensitive information about the network environment and the machine it runs on, including network configuration and details about the system. The detection mechanism targets specific command lines that contain 'gatherNetworkInfo.vbs' while filtering out benign instances executed through recognized Windows script hosts such as 'cscript.exe' and 'wscript.exe', indicating potential misuse of legitimate tools for reconnaissance purposes. The leveraging of such scripts for unauthorized data gathering could be indicative of wider attack patterns and hence warrants a high severity level for alerts when detected.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2023-02-08