WSF/JSE/JS/VBA/VBE File Execution
Detects suspicious file execution by wscript and cscript
Sigma rule (View on GitHub)
1title: WSF/JSE/JS/VBA/VBE File Execution
2id: 1e33157c-53b1-41ad-bbcc-780b80b58288
3related:
4 - id: 23250293-eed5-4c39-b57a-841c8933a57d
5 type: obsoletes
6status: test
7description: Detects suspicious file execution by wscript and cscript
8author: Michael Haag
9date: 2019/01/16
10modified: 2023/03/02
11tags:
12 - attack.execution
13 - attack.t1059.005
14 - attack.t1059.007
15
16logsource:
17 category: process_creation
18 product: windows
19detection:
20 selection_img:
21 - OriginalFileName:
22 - 'wscript.exe'
23 - 'cscript.exe'
24 - Image|endswith:
25 - '\wscript.exe'
26 - '\cscript.exe'
27 selection_cli:
28 CommandLine|contains:
29 - '.js'
30 - '.jse'
31 - '.vba'
32 - '.vbe'
33 - '.vbs'
34 condition: all of selection_*
35fields:
36 - CommandLine
37 - ParentCommandLine
38falsepositives:
39 - Will need to be tuned. I recommend adding the user profile path in CommandLine if it is getting too noisy.
40level: medium