title: WScript or CScript Dropper author: Margaritis Dimitrios (idea), Florian Roth (rule), oscd.community date: 2019/01/16 description: Detects wscript/cscript executions of scripts located in user directories detection: SELECTION_1: EventID: 1 SELECTION_10: CommandLine: '*.vbs*' SELECTION_11: ParentImage: '*\winzip*' SELECTION_2: Image: '*\wscript.exe' SELECTION_3: Image: '*\cscript.exe' SELECTION_4: CommandLine: '*C:\Users\\*' SELECTION_5: CommandLine: '*C:\ProgramData\\*' SELECTION_6: CommandLine: '*.jse*' SELECTION_7: CommandLine: '*.vbe*' SELECTION_8: CommandLine: '*.js*' SELECTION_9: CommandLine: '*.vba*' condition: (SELECTION_1 and ((SELECTION_2 or SELECTION_3) and (SELECTION_4 or SELECTION_5) and (SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10)) and not (SELECTION_11)) falsepositives: - Winzip - Other self-extractors fields: - CommandLine - ParentCommandLine id: cea72823-df4d-4567-950c-0b579eaf0846 level: high logsource: category: process_creation product: windows modified: 2020/09/01 status: experimental tags: - attack.execution - attack.t1059.005 - attack.t1059.007 - attack.defense_evasion - attack.t1064 yml_filename: win_malware_script_dropper.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation