Windows Suspicious Script Object Executionedit

Identifies scrobj.dll loaded into unusual Microsoft processes. This usually means a malicious scriptlet is being executed in the target process.

Rule type: eql

Rule indices:

  • winlogbeat-*

Severity: medium

Risk score: 21

Runs every: 5 minutes

Searches indices from: now-9m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100


  • Elastic
  • Host
  • Windows
  • Threat Detection
  • Defense Evasion

Version: 2 (version history)

Added (Elastic Stack release): 7.10.0

Last modified (Elastic Stack release): 7.11.0

Rule authors: Elastic

Rule license: Elastic License

Rule queryedit

/* add winlogbeat-* when process.code_signature.* fields are populated
*/ sequence by process.entity_id with maxspan=2m [process where
event.type in ("start", "process_started") and /* uncomment once
in winlogbeat */ /* process.code_signature.subject_name ==
"Microsoft Corporation" and process.code_signature.trusted == true and
*/ not ( : "cscript.exe" or :
"iexplore.exe" or : "MicrosoftEdge.exe" or : "msiexec.exe" or :
"smartscreen.exe" or : "taskhostw.exe" or : "w3wp.exe" or : "wscript.exe")]
[library where event.type == "start" and : "scrobj.dll"]

Threat mappingedit


Rule version historyedit

Version 2 (7.11.0 release)
  • Formatting only