ZIP File Spawning JavaScript

RedCanary detected high volumes of obfuscation this year looking for apparent phishing schemes where adversaries conceal JavaScript payloads in ZIP files and write them to the users and temp directories. Part of the RedCanary 2024 Threat Detection Report.

Sigma rule (View on GitHub)

 1title: ZIP File Spawning JavaScript
 2id: b99b32f3-aa61-495d-a6a1-2595e1551ba8
 3status: experimental
 4description: |
 5    RedCanary detected high volumes of obfuscation this year looking for apparent phishing 
 6    schemes where adversaries conceal JavaScript payloads in ZIP files and write them 
 7    to the users and temp directories. Part of the RedCanary 2024 Threat Detection Report.    
 8references:
 9    - https://redcanary.com/threat-detection-report/techniques/obfuscated-files-information/
10author: RedCanary, Sigma formatting by Micah Babinski
11date: 2024/03/21
12tags:
13    - attack.defense_evasion
14    - attack.t1027
15logsource:
16    category: network_connection
17    product: windows
18detection:
19    selection:
20        Image|endswith: '\wscript.exe'
21        CommandLine|contains|all:
22            - 'users'
23            - 'temp'
24            - '.zip'
25            - '.js'
26    condition: selection
27falsepositives:
28    - Unknown
29level: low```

References

Related rules

to-top