heroui logo

Remote Code Execute via Winrm.vbs

Sigma Rules

View Source
Summary
This detection rule identifies potential remote code execution attempts through the scripting tool `winrm.vbs`, which is commonly abused by attackers to execute code on remote Windows hosts. The rule monitors the process creation events specifically looking for instances of `cscript.exe` as the execution host, alongside command line arguments indicative of WinRM operations such as `-r:http`, which specifies a remote execution target. The intent is to alert administrators to unauthorized or suspicious activity that may signal lateral movement within an organization – a technique often employed in sophisticated cyber attacks. The defined conditions help ensure that only relevant execution patterns are flagged, reducing false positives while maintaining sensitivity against actual threats. Given the rule's medium severity level, it emphasizes the necessity for further investigation when the alert is triggered, particularly within environments where WinRM usage is strictly controlled or monitored.
Categories
  • Windows
  • Network
  • Endpoint
Data Sources
  • Process
  • Command
Created: 2020-10-07