mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 17:35:19 +00:00
mshta shells
🐚 for all!
This commit is contained in:
parent
1317fe9df2
commit
4ac5d86479
23
rules/windows/sysmon/sysmon_mshta_spawn_shell.yml
Normal file
23
rules/windows/sysmon/sysmon_mshta_spawn_shell.yml
Normal file
@ -0,0 +1,23 @@
|
||||
title: MSHTA Spawning Windows Shell
|
||||
status: experimental
|
||||
description: Detects a Windows command line executable started from MSHTA.
|
||||
reference: https://www.trustedsec.com/july-2015/malicious-htas/
|
||||
author: Michael Haag
|
||||
logsource:
|
||||
product: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
ParentImage:
|
||||
- '*\mshta.exe'
|
||||
Image:
|
||||
- '*\cmd.exe'
|
||||
- '*\powershell.exe'
|
||||
- '*\wscript.exe'
|
||||
- '*\cscript.exe'
|
||||
- '*\sh.exe'
|
||||
- '*\bash.exe'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Minimal FPs.
|
||||
level: high
|
Loading…
Reference in New Issue
Block a user