Cscript/Wscript Uncommon Script Extension Execution
Detects Wscript/Cscript executing a file with an uncommon (i.e. non-script) extension
Sigma rule (View on GitHub)
1title: Cscript/Wscript Uncommon Script Extension Execution
2id: 99b7460d-c9f1-40d7-a316-1f36f61d52ee
3status: test
4description: Detects Wscript/Cscript executing a file with an uncommon (i.e. non-script) extension
5references:
6 - Internal Research
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-05-15
9modified: 2023-06-19
10tags:
11 - attack.execution
12 - attack.t1059.005
13 - attack.t1059.007
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection_img:
19 - OriginalFileName:
20 - 'wscript.exe'
21 - 'cscript.exe'
22 - Image|endswith:
23 - '\wscript.exe'
24 - '\cscript.exe'
25 selection_extension:
26 CommandLine|contains:
27 # Note: add additional potential suspicious extension
28 # We could specify the "//E:" flag to avoid typos by admin. But since that's prone to blind spots via the creation of assoc it's better not to include it
29 - '.csv'
30 - '.dat'
31 - '.doc'
32 - '.gif'
33 - '.jpeg'
34 - '.jpg'
35 - '.png'
36 - '.ppt'
37 - '.txt'
38 - '.xls'
39 - '.xml'
40 condition: all of selection_*
41falsepositives:
42 - Unknown
43level: high
References
Related rules
- Adwind RAT / JRAT
- Adwind RAT / JRAT File Artifact
- Csc.EXE Execution Form Potentially Suspicious Parent
- File Was Not Allowed To Run
- HTML Help HH.EXE Suspicious Child Process