<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cscript — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cscript/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cscript/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Child Processes Spawned by WScript or CScript</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-wscript-cscript-suspicious-child-process/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-wscript-cscript-suspicious-child-process/</guid><description>Detects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Windows Script Host (WScript) or CScript. Adversaries commonly leverage WScript and CScript to execute malicious scripts, LOLBINs (Living Off The Land Binaries), and PowerShell, or inject code into suspended processes as a form of defense evasion. While some legitimate scripts may utilize tools detected by this analytic, it serves as a valuable indicator that a script may be executing suspicious code. Notably, the WhisperGate malware and campaigns by FIN7 have employed similar techniques. This activity has been observed since at least 2022, and continues to be relevant for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user (unknowingly or through social engineering) executes a malicious script.</li>
<li>The malicious script is interpreted by either <code>wscript.exe</code> or <code>cscript.exe</code>.</li>
<li>The script executes a LOLBIN such as <code>regsvr32.exe</code>, <code>rundll32.exe</code>, <code>winhlp32.exe</code>, <code>certutil.exe</code>, <code>msbuild.exe</code>, <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>wmic.exe</code>, or <code>mshta.exe</code>.</li>
<li>The LOLBIN executes further commands or downloads additional payloads. <code>Certutil.exe</code> may be used to decode and install malicious binaries.</li>
<li>The attacker gains control over the compromised system.</li>
<li>The attacker uses the compromised system as a pivot for lateral movement.</li>
<li>The attacker attempts to escalate privileges and establish persistence.</li>
<li>The attacker may exfiltrate data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete system compromise, data theft, and potential ransomware deployment. Organizations across various sectors are vulnerable, as this technique is commonly used by both commodity malware and advanced persistent threat (APT) groups. The WhisperGate malware targeting Ukrainian organizations in 2022 demonstrated the destructive potential of this technique.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) and Windows Event Log Security Auditing (4688) to capture process execution events necessary for the provided rules.</li>
<li>Deploy the Sigma rule <code>Suspicious Child Processes Spawned by WScript or CScript</code> to your SIEM to detect suspicious child processes. Tune the rule based on your environment&rsquo;s baseline activity, filtering out any legitimate use cases.</li>
<li>Investigate any alerts generated by this rule, focusing on the parent and child processes involved and the commands executed.</li>
<li>Monitor endpoint logs for unusual or unexpected process executions originating from WScript or CScript.</li>
<li>Block execution of the LOLBINs (<code>regsvr32.exe</code>, <code>rundll32.exe</code>, <code>winhlp32.exe</code>, <code>certutil.exe</code>, <code>msbuild.exe</code>, <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>wmic.exe</code>, or <code>mshta.exe</code>) if they are not required in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wscript</category><category>cscript</category><category>lolbin</category><category>malware</category><category>defense-evasion</category></item></channel></rss>