<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Script_interpreter — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/script_interpreter/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 28 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/script_interpreter/feed.xml" rel="self" type="application/rss+xml"/><item><title>Remote File Download via Script Interpreter</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-remote-file-copy-scripts/</link><pubDate>Sun, 28 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-remote-file-copy-scripts/</guid><description>Attackers are using Windows script interpreters (cscript.exe or wscript.exe) to download executable files from remote locations to deliver second-stage payloads or download tools.</description><content:encoded><![CDATA[<p>Attackers commonly use Windows Script Host (WSH) scripts as an initial access method or to download tools and utilities. This involves using built-in Windows script interpreters like <code>cscript.exe</code> or <code>wscript.exe</code> to download executable files from remote destinations. This behavior is significant because it allows attackers to bypass traditional defenses and establish a foothold in the system or download further tools. Defenders should monitor for suspicious network connections initiated by script interpreters followed by the creation of executable files on the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (delivery mechanism not specified in source).</li>
<li>The attacker executes a script using <code>cscript.exe</code> or <code>wscript.exe</code>.</li>
<li>The script interpreter makes an outbound network connection to a remote server.</li>
<li>The remote server hosts a malicious executable file (e.g., .exe, .dll).</li>
<li>The script downloads the malicious executable to the compromised system.</li>
<li>The downloaded file is saved to disk.</li>
<li>The attacker executes the downloaded malicious file to establish persistence or further compromise the system.</li>
<li>The attacker performs additional actions, such as lateral movement or data exfiltration (not detailed in the source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the installation of malware, unauthorized access to sensitive data, and further compromise of the affected system. This can result in data breaches, financial losses, and reputational damage. The source does not contain specific victim numbers or sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Remote File Download via Script Interpreter - File Creation&rdquo; to your SIEM to detect the creation of executable files after network activity from <code>cscript.exe</code> or <code>wscript.exe</code>.</li>
<li>Deploy the Sigma rule &ldquo;Remote File Download via Script Interpreter - Network Connection&rdquo; to detect network connections from <code>cscript.exe</code> or <code>wscript.exe</code>.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) and Event ID 11 (File Create) for enhanced visibility into network and file activity related to script interpreters.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>execution</category><category>windows</category><category>script_interpreter</category></item></channel></rss>