heroui logo

AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl - File

Sigma Rules

View Source
Summary
This detection rule targets the execution of attacker-controlled files named WsmPty.xsl or WsmTxt.xsl, which can be executed through a Windows Remote Management (WinRM) script (winrm.vbs). The detection specifically looks for instances where these files are invoked, particularly when they are not located in the standard system directory (C:\Windows\System32\ or C:\Windows\SysWOW64\). This is significant as it points to a potential application whitelisting bypass technique being exploited by an attacker using a maliciously crafted script. The rule defines a medium severity level due to the potential impact of running unauthorized code via Windows mechanisms. The rule fits within the framework of defense evasion techniques employed by threat actors.
Categories
  • Windows
Data Sources
  • File
Created: 2020-10-06