
Summary
The detection rule titled **Execution of a Downloaded Windows Script** is designed to identify potentially malicious activities involving Windows scripts that are downloaded from the internet and subsequently executed. This behavior is of interest to security teams because adversaries may utilize scripts, such as `.js`, `.vbs`, or `.bat` files, for initial access and code execution to compromise systems. The rule leverages a sequence-based query that looks for the file creation and execution patterns on Windows systems. It specifies that the rule triggers when an acceptable file type is created by a non-system user and is subsequently executed by common scripting tools (`wscript.exe`, `mshta.exe`, or `cmd.exe`). Additionally, the rule incorporates context for the downloaded scripts, signaling potential danger if sourced from dubious URLs. An attached investigation guide helps analysts handle incidents, outlining steps for reviewing file origins, tracking execution paths, and mitigating threats while addressing the possibility of false positives from benign script activities. Exploring parent-child process relationships adds depth to the analysis, allowing for thorough assessments of user actions and system integrity.
Categories
- Endpoint
- Windows
Data Sources
- File
- Process
ATT&CK Techniques
- T1059
- T1059.005
- T1059.007
- T1059.003
- T1218
- T1218.005
Created: 2025-01-31