Outbound Network Connection Initiated By Script Interpreter
Detects a script interpreter wscript/cscript opening a network connection to a non-local network. Adversaries may use script to download malicious payloads.
Sigma rule (View on GitHub)
1title: Outbound Network Connection Initiated By Script Interpreter
2id: 992a6cae-db6a-43c8-9cec-76d7195c96fc
3related:
4 - id: 08249dc0-a28d-4555-8ba5-9255a198e08c
5 type: derived
6status: test
7description: Detects a script interpreter wscript/cscript opening a network connection to a non-local network. Adversaries may use script to download malicious payloads.
8references:
9 - https://github.com/redcanaryco/atomic-red-team/blob/28d190330fe44de6ff4767fc400cc10fa7cd6540/atomics/T1105/T1105.md
10author: frack113, Florian Roth (Nextron Systems)
11date: 2022-08-28
12modified: 2024-03-13
13tags:
14 - attack.command-and-control
15 - attack.t1105
16logsource:
17 category: network_connection
18 product: windows
19detection:
20 selection:
21 Initiated: 'true'
22 Image|endswith:
23 - '\wscript.exe'
24 - '\cscript.exe'
25 filter_main_local_ranges:
26 DestinationIp|cidr:
27 - '127.0.0.0/8'
28 - '10.0.0.0/8'
29 - '172.16.0.0/12'
30 - '192.168.0.0/16'
31 - '169.254.0.0/16'
32 - '::1/128' # IPv6 loopback
33 - 'fe80::/10' # IPv6 link-local addresses
34 - 'fc00::/7' # IPv6 private addresses
35 filter_main_ms_ranges:
36 DestinationIp|cidr: '20.0.0.0/11' # Microsoft range, caused some FPs
37 condition: selection and not 1 of filter_main_*
38falsepositives:
39 - Legitimate scripts
40level: high
References
Related rules
- AppX Package Installation Attempts Via AppInstaller.EXE
- Arbitrary File Download Via GfxDownloadWrapper.EXE
- Browser Execution In Headless Mode
- Cisco Stage Data
- Command Line Execution with Suspicious URL and AppData Strings