MSHTA Rule v1

This commit is contained in:
Florian Roth 2017-04-13 01:08:30 +02:00
parent 64caa8aedc
commit c2ed7bd9df
2 changed files with 18 additions and 1 deletions

View File

@ -1,4 +1,4 @@
title: Microsoft Office Product Spawning Windows Shell
title: Microsoft Office Product Spawning Windows Shell
status: experimental
description: Detects a Windows command line executable started from Microsoft Word, Excel, Powerpoint, Publisher and Visio.
reference: https://www.hybrid-analysis.com/sample/465aabe132ccb949e75b8ab9c5bda36d80cf2fd503d52b8bad54e295f28bbc21?environmentId=100

View File

@ -0,0 +1,17 @@
title: Suspicious MSHTA Child
status: experimental
description: Detects a Microsoft HTML Application Host execution a suspicious child process
reference: https://twitter.com/wdormann/status/851615583099650049
author: Florian Roth
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
ParentImage: '*\mshta.exe'
condition: selection
falsepositives:
- unknown
level: high