Suspicious Script Execution From Temp Folder
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects a suspicious script executions from temporary folder
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Process started" AND (PROCESSNAME endswith "\powershell.exe,\pwsh.exe,\mshta.exe,\wscript.exe,\cscript.exe" AND COMMANDLINE contains "\Windows\Temp,\Temporary Internet,\AppData\Local\Temp,\AppData\Roaming\Temp,%TEMP%,%TMP%,%LocalAppData%\Temp") AND COMMANDLINE notcontains " >,Out-File,ConvertTo-Json,-WindowStyle hidden -Verb runAs,\Windows\system32\config\systemprofile\AppData\Local\Temp\Amazon\EC2-Windows" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton


