
Summary
The rule identifies the execution of the 'REGISTER_APP.VBS' script, which is typically signed by Microsoft and can be used to register a Volume Shadow Copy Service (VSS) or Virtual Disk Service (VDS) provider as a COM+ application. The detection rule focuses on the command line parameters passed during the process creation of this script, specifically checking for the presence of the '\register_app.vbs' and the '-register' option. The usage of this script can often signify attempts to manipulate system processes for malicious purposes or evasion techniques. While the script may have legitimate applications, it's important to investigate its usage context to confirm whether the action is benign or malicious. Given its potential for legitimate use, the detection level has been set to medium, highlighting the necessity for careful scrutiny rather than outright blocking any instance of this script being executed.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-08-19