heroui logo

Execute Javascript With Jscript COM CLSID

Splunk Security Content

View Source
Summary
This detection rule targets malicious activities associated with the execution of JavaScript through the JScript.Encode CLSID (COM Object) using cscript.exe. It utilizes telemetry from Endpoint Detection and Response (EDR) systems to monitor process actions, command-line inputs, and the relationships between parent and child processes. The rule is relevant because the JScript.Encode technique is commonly exploited by ransomware variants such as Reddot to execute harmful scripts while circumventing security mechanisms like AMSI (Antimalware Scan Interface). If this behavior is confirmed, it may lead to unauthorized code execution or persistence in a compromised environment. To implement this rule, organizations must ensure ingestion of proper logs and telemetry data to identify potential executions of cscript.exe with the specified CLSID, allowing for proactive defense against embedded attacks.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1059
  • T1059.005
Created: 2024-11-13