
Summary
The 'Windows AutoIt3 Execution' detection rule targets the execution of AutoIt3 scripts, which are commonly utilized for automating GUI tasks in Windows. This rule focuses on identifying processes with the names 'autoit3.exe' and variations thereof. The significance of this detection lies in the fact that malicious actors frequently exploit AutoIt3 for automating malware execution or other harmful activities, potentially leading to unauthorized system access and further malware spread. The rule uses data from Sysmon, Windows Event Logs, and CrowdStrike EDR, enabling comprehensive monitoring of process activities to capture relevant AutoIt3 executions. The underlying search utilizes event data to compile statistics on detected processes, along with their actions and relationships to other processes, in order to provide context to the detected behavior. Additionally, considerations for false positives are noted, particularly for legitimate usage of AutoIt3 in safe environments.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1059
Created: 2024-11-13