
Summary
This analytic detection rule identifies the execution of JScript through the cscript.exe process, which is atypical since JScript is commonly executed by wscript.exe. By monitoring relevant data generated from Endpoint Detection and Response (EDR) tools, particularly focusing on telemetry related to processes and command lines, this detection aims to highlight potentially malicious activities. Such actions may relate to advanced persistent threats like those exhibited by the FIN7 group. If flagged, the execution can lead to serious outcomes such as arbitrary code execution, data exfiltration, or further system breaches. The rule utilizes logs from Sysmon, Windows Event Logs, and CrowdStrike to correlate processes that match specified criteria. The search logic targets the abnormal invocation of cscript.exe with command-line arguments related to JScript files, indicating a deviation from standard operating procedures. The implementation requires integration with EDR logs and proper mapping to Splunk's Endpoint data model to ensure accurate threat detection.
Categories
- Endpoint
Data Sources
- Process
- Command
- Windows Registry
ATT&CK Techniques
- T1059
- T1059.007
Created: 2024-11-13