DET0528 Detecting Remote Script Proxy Execution via PubPrn.vbs
| Item |
Value |
| ID |
DET0528 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1216.001 (PubPrn)
Analytics
Windows
AN1464
Execution of PubPrn.vbs via cscript.exe using the ‘script:’ moniker to load and execute a remote .sct scriptlet file, bypassing signature validation and proxying remote payloads through a signed Microsoft script host.
Log Sources
Mutable Elements
| Field |
Description |
| CommandLineRegex |
Detects ‘script:’ moniker with HTTP/HTTPS URI as argument to pubprn.vbs |
| ParentProcessName |
May vary between cscript.exe, wscript.exe, or cmd.exe depending on execution method |
| NetworkDestinationDomain |
Used to detect external domains being contacted for remote scriptlet execution |
| TimeWindow |
Maximum allowed time delta between pubprn.vbs invocation and network connection or child process |