
Summary
This detection rule identifies the usage of built-in Windows script interpreters (cscript.exe and wscript.exe) to execute processes via Windows Management Instrumentation (WMI), which may signal potential malicious behavior. The rule functions by monitoring for the loading of WMI utilities and tracking script interpreter launches via parent process associations. When cscript.exe or wscript.exe is initiated, particularly by non-system accounts, it raises alerts due to the suspicious nature of such executions. The rule is configured to analyze events from multiple logs related to Windows operations, utilizing a sequence-based approach in EQL (Event Query Language) that filters out legitimate activity by focusing on behaviors typical of malicious intent. It includes detailed investigation and response guidance, emphasizing the need to inspect user accounts and the possible context of the process initiation to distinguish between legitimate use cases and potential threats.
Categories
- Endpoint
- Windows
Data Sources
- Process
- WMI
- Application Log
- Network Traffic
ATT&CK Techniques
- T1566
- T1566.001
- T1047
- T1059
- T1059.005
Created: 2020-11-27