<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Scripting-Engine — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/scripting-engine/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 12:50:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/scripting-engine/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Registry Modifications by Scripting Engines</title><link>https://feed.craftedsignal.io/briefs/2026-04-susp-reg-mod/</link><pubDate>Tue, 14 Apr 2026 12:50:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-susp-reg-mod/</guid><description>Scripting engines such as WScript, CScript, and MSHTA are being used to make registry modifications, potentially for persistence or defense evasion.</description><content:encoded><![CDATA[<p>This brief covers suspicious registry modifications made by scripting engine processes like WScript, CScript, and MSHTA. These processes are often abused by attackers to modify the registry without using standard tools like regedit.exe or reg.exe, potentially for evasion and persistence. Legitimate use of these scripting engines to modify the registry is uncommon, making this behavior a good indicator of potential malicious activity. Defenders should monitor for these processes interacting with sensitive registry keys. This activity was observed as of 2025 and continues to be a relevant technique for persistence and defense evasion in 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via an exploit or social engineering.</li>
<li>The attacker uses MSHTA.exe to execute malicious HTML Application code.</li>
<li>MSHTA.exe is used to launch a PowerShell script.</li>
<li>The PowerShell script uses the Registry module to add a new registry key.</li>
<li>The registry key is configured to execute a payload upon system startup.</li>
<li>The attacker uses wscript.exe or cscript.exe to execute VBScript or JScript.</li>
<li>The script modifies registry values to disable security features.</li>
<li>The compromised system restarts, executing the payload defined in the registry, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistence on the targeted system, enabling them to maintain access even after a reboot. This can lead to data theft, further malware deployment, or complete system compromise. The impact ranges from minor data breaches to significant operational disruptions. The scope of the impact depends on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; to your SIEM to detect this specific activity, and tune for your environment (rules).</li>
<li>Investigate any instances of wscript.exe, cscript.exe or mshta.exe modifying registry keys outside of known-good paths (rules).</li>
<li>Monitor registry events for unexpected modifications by scripting engines, focusing on persistence-related keys (rules).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>registry-modification</category><category>persistence</category><category>defense-evasion</category><category>scripting-engine</category></item></channel></rss>