VBScript Payload Stored in Registry

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects VBScript content stored into registry keys as seen being used by UNC2452 group

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Registry value modified" AND ((OBJECTNAME contains "Software\Microsoft\Windows\CurrentVersion" OR (OBJECTNAME endswith "Software\Microsoft\Windows" AND OBJECTVALUENAME startswith "CurrentVersion")) AND INFORMATION contains "vbscript:,jscript:,mshtml,,RunHTMLApplication,Execute(,CreateObject,window.close") AND ((OBJECTNAME notcontains "Software\Microsoft\Windows\CurrentVersion\Run" AND (OBJECTNAME notendswith "Software\Microsoft\Windows\CurrentVersion" OR OBJECTVALUENAME notstartswith "Run")) AND (PROCESSNAME notendswith "\msiexec.exe" OR (OBJECTNAME notcontains "\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData" AND (OBJECTNAME notendswith "\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData" OR isNotExist(OBJECTVALUENAME))) OR INFORMATION notcontains "\Microsoft.NET\Primary Interop Assemblies\Microsoft.mshtml.dll,<\Microsoft.mshtml,fileVersion=,_mshtml_dll_,<\Microsoft.mshtml,culture=")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems)