Suspicious Script Execution From Temp Folder
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects a suspicious script executions from temporary folder
Severity
Trouble
Rule Requirement
Criteria
Action1:
actionname = "Process started" AND (PROCESSNAME endswith "\powershell.exe,\pwsh.exe,\mshta.exe,\wscript.exe,\cscript.exe" AND COMMANDLINE contains "\Windows\Temp,\Temporary Internet,\AppData\Local\Temp,\AppData\Roaming\Temp,%TEMP%,%TMP%,%LocalAppData%\Temp") AND COMMANDLINE notcontains " >,Out-File,ConvertTo-Json,-WindowStyle hidden -Verb runAs,\Windows\system32\config\systemprofile\AppData\Local\Temp\Amazon\EC2-Windows"
select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME,Action1.DOMAIN,Action1.ORIGINALFILENAME,Action1.PARENTPROCESSID,Action1.PROCESSID,Action1.PRODUCT_NAME,Action1.SECURITYID
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton


