heroui logo

Potential Manage-bde.wsf Abuse To Proxy Execution

Sigma Rules

View Source
Summary
This rule is designed to detect potential abuse of the "manage-bde.wsf" script, which is exploited as a Living Off the Land Binary (LOLBIN) to perform unauthorized command execution on Windows systems. The detection occurs through monitoring process creation events, specifically checking for instances where "wscript.exe" or "cscript.exe" is used to invoke the "manage-bde.wsf" script. The rule triggers when certain conditions are met: either when "wscript.exe" is executing with the script as part of its command line, or when the script is run as a child process of "wscript.exe" or "cscript.exe", while also excluding executions through the command prompt. Given the potential for misuse of the script as a proxy for operations that evade traditional security measures, this detection is classified as high severity, making it critical for maintaining system integrity.
Categories
  • Windows
  • Endpoint
  • Application
Data Sources
  • Process
  • Script
ATT&CK Techniques
  • T1216
Created: 2020-10-13