Skip to content

Hide Navigation Hide TOC

Wscript (be8d1032-3452-4d44-83cb-c7ece7d5a052)

This object contains information sourced from the Living Off The Land Binaries, Scripts and Libraries (LOLBAS) project, which is licensed under GNU General Public License v3.0.

Description: Used by Windows to execute scripts

Author: Oddvar Moe

Paths: * C:\Windows\System32\wscript.exe * C:\Windows\SysWOW64\wscript.exe

Resources: * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f

Detection: * Sigma: proc_creation_win_wscript_cscript_script_exec.yml * Sigma: file_event_win_net_cli_artefact.yml * Sigma: image_load_susp_script_dotnet_clr_dll_load.yml * Elastic: defense_evasion_unusual_dir_ads.toml * Elastic: command_and_control_remote_file_copy_scripts.toml * Elastic: defense_evasion_suspicious_managedcode_host_process.toml * Splunk: wscript_or_cscript_suspicious_child_process.yml * BlockRule: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules * IOC: Wscript.exe executing code from alternate data streams * IOC: DotNet CLR libraries loaded into wscript.exe * IOC: DotNet CLR Usage Log - wscript.exe.log[Wscript.exe - LOLBAS Project]

Cluster A Galaxy A Cluster B Galaxy B Level
Ember Bear (407274be-1820-4a84-939e-629313f4de1d) Tidal Groups Wscript (be8d1032-3452-4d44-83cb-c7ece7d5a052) Tidal Software 1
Lazarus Group (0bc66e95-de93-4de7-b415-4041b7191f08) Tidal Groups Wscript (be8d1032-3452-4d44-83cb-c7ece7d5a052) Tidal Software 1