WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Detects script file execution (.js, .jse, .vba, .vbe, .vbs, .wsf) by Wscript/Cscript
Sigma rule (View on GitHub)
1title: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
2id: 1e33157c-53b1-41ad-bbcc-780b80b58288
3related:
4 - id: 23250293-eed5-4c39-b57a-841c8933a57d
5 type: obsoletes
6status: test
7description: Detects script file execution (.js, .jse, .vba, .vbe, .vbs, .wsf) by Wscript/Cscript
8author: Michael Haag
9date: 2019/01/16
10modified: 2023/05/15
11tags:
12 - attack.execution
13 - attack.t1059.005
14 - attack.t1059.007
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection_img:
20 - OriginalFileName:
21 - 'wscript.exe'
22 - 'cscript.exe'
23 - Image|endswith:
24 - '\wscript.exe'
25 - '\cscript.exe'
26 selection_cli:
27 CommandLine|contains:
28 - '.js'
29 - '.jse'
30 - '.vba'
31 - '.vbe'
32 - '.vbs'
33 - '.wsf'
34 condition: all of selection_*
35falsepositives:
36 - Some additional tuning is required. It is recommended to add the user profile path in CommandLine if it is getting too noisy.
37level: medium
Related rules
- Adwind RAT / JRAT
- Adwind RAT / JRAT File Artifact
- Cscript/Wscript Uncommon Script Extension Execution
- Potential SquiblyTwo Technique Execution
- WScript or CScript Dropper - File