DotNet CLR DLL Loaded By Scripting Applications

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects .NET CLR DLLs being loaded by scripting applications such as wscript or cscript. This could be an indication of potential suspicious execution.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "sa_imageloaded" AND PROCESSNAME endswith "\cmstp.exe,\cscript.exe,\mshta.exe,\msxsl.exe,\regsvr32.exe,\wmic.exe,\wscript.exe" AND OBJECTNAME endswith "\clr.dll,\mscoree.dll,\mscorlib.dll" select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.PRODUCT_NAME,Action1.OBJECTNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

omkar72, oscd.community