title: WSF/JSE/JS/VBA/VBE File Execution author: Michael Haag date: 2019/01/16 description: Detects suspicious file execution by wscript and cscript detection: SELECTION_1: EventID: 1 SELECTION_2: Image: '*\wscript.exe' SELECTION_3: Image: '*\cscript.exe' SELECTION_4: CommandLine: '*.jse*' SELECTION_5: CommandLine: '*.vbe*' SELECTION_6: CommandLine: '*.js*' SELECTION_7: CommandLine: '*.vba*' condition: (SELECTION_1 and (SELECTION_2 or SELECTION_3) and (SELECTION_4 or SELECTION_5 or SELECTION_6 or SELECTION_7)) falsepositives: - Will need to be tuned. I recommend adding the user profile path in CommandLine if it is getting too noisy. fields: - CommandLine - ParentCommandLine id: 1e33157c-53b1-41ad-bbcc-780b80b58288 level: medium logsource: category: process_creation product: windows modified: 2020/08/28 status: experimental tags: - attack.execution - attack.t1059.005 - attack.t1059.007 - attack.t1064 yml_filename: win_susp_script_execution.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation