DET0466 Detection of Script-Based Proxy Execution via Signed Microsoft Utilities
| Item |
Value |
| ID |
DET0466 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1216 (System Script Proxy Execution)
Analytics
Windows
AN1288
Execution of Microsoft-signed scripts (e.g., pubprn.vbs, installutil.exe, wscript.exe, cscript.exe) used to proxy execution of untrusted or external binaries. Behavior is detected through command-line process lineage, child process spawning, and unsigned payload execution from signed parent.
Log Sources
Mutable Elements
| Field |
Description |
| ParentProcessName |
Environment-specific paths to script interpreters like wscript.exe, cscript.exe, pubprn.vbs, or installutil.exe. |
| TimeWindow |
Time delta between signed script execution and suspicious child process creation. |
| ChildCommandLineRegex |
Regex pattern used to detect malicious payload execution (e.g., download cradle, PowerShell decode). |
| SignedToUnsignedTransition |
Indicates whether the parent is signed by Microsoft but child is unsigned or unknown. |