
Summary
The rule "Excel Spawning Windows Script Host" is designed to detect instances where Microsoft Excel initiates Windows Script Host processes such as `cscript.exe` or `wscript.exe`. This suspicious behavior is identified using Endpoint Detection and Response (EDR) telemetry with a focus on process creation events where `excel.exe` serves as the parent process. The detection is significant given that it is atypical and often correlates with nefarious activities, particularly those tied to spearphishing attacks aimed at executing potentially harmful scripts. If these events are deemed malicious, the risks include unauthorized code execution, data exfiltration, or broader system compromise. This detection mechanism is now deprecated in favor of a more generalized approach, though immediate investigation and remediation are still strongly advised when such activity is confirmed.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1566
- T1003.002
- T1003
- T1566.001
Created: 2025-01-13