heroui logo

Use of Scriptrunner.exe

Sigma Rules

View Source
Summary
The threat detection rule focuses on the abuse of the "ScriptRunner.exe" binary, which is commonly used in Windows environments. Attackers may leverage this binary to execute scripts while bypassing security controls such as whitelists. The detection rule is designed to identify potential misuse by monitoring process creation events associated with the "ScriptRunner.exe" binary. It looks for certain characteristics, including the presence of the binary in the execution path and specific command-line arguments that indicate malicious activity. The rule aims to alert on any instances where the binary is executed in a potentially unauthorized context, thereby enhancing security monitoring around script execution methods. As "ScriptRunner.exe" can also be used for legitimate purposes, particularly in environments utilizing Application Virtualization (App-V), care should be taken to analyze the context of alerts to reduce false positives.
Categories
  • Windows
Data Sources
  • Process
Created: 2022-07-01