Rules: VBS file downloaded from Internet
Although Visual Basic scripts (.vbs) are sometimes regularly downloaded from the Internet, they are often part of malware establishment. They carry an elevated risk.
Detail | Value |
---|---|
Type | Match |
Category | Execution |
Apply Risk to Entities | device_hostname, device_ip, srcDevice_hostname, srcDevice_ip, user_username |
Signal Name | VBS file downloaded from Internet |
Summary Expression | User: {{user_username}} download VBS file on IP: {{srcDevice_ip}} from URL: {{http_url}} |
Score/Severity | Static: 3 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTactic:TA0002, _mitreAttackTechnique:T1204, _mitreAttackTechnique:T1204.002, _mitreAttackTechnique:T1059, _mitreAttackTechnique:T1059.005 |
- Bro - Bro
- CheckPoint - URL Filtering
- Cisco Systems - Meraki
- Cloudflare - Logpush
- Forcepoint - Web Security
- Fortinet - Fortigate
- McAfee - Web Gateway
- Netskope - Security Cloud
- Palo Alto Networks - Next Generation Firewall
- Sophos - UTM 9
- Zscaler - Firewall
- Zscaler - Nanolog Streaming Service
Origin | Field |
---|---|
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | dstDevice_ip_isInternal |
Normalized Schema | http_url |
Normalized Schema | http_url_alexaRank |
Normalized Schema | listMatches |
Normalized Schema | srcDevice_hostname |
Normalized Schema | srcDevice_ip |
Normalized Schema | user_username |