SigmaHQ/rules/windows/process_creation/win_susp_mshta_pattern.yml
2021-07-17 09:04:41 +02:00

48 lines
1.4 KiB
YAML

title: Suspicious MSHTA Process Patterns
id: e32f92d1-523e-49c3-9374-bdb13b46a3ba
status: experimental
description: Detects suspicious mshta process patterns
references:
- https://en.wikipedia.org/wiki/HTML_Application
- https://www.echotrail.io/insights/search/mshta.exe
- https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/
tags:
- attack.execution
author: Florian Roth
date: 2021/07/17
logsource:
category: process_creation
product: windows
detection:
# Binary Selector
selection_base:
Image|endswith: '\mhsta.exe'
# Suspicious parents
selection1:
ParentImage|endswith:
- '\cmd.exe'
- '\powershell.exe'
# Suspicious folders
selection2:
CommandLine|contains:
- '\AppData\Local'
- 'C:\Windows\Temp'
- 'C:\Users\Public'
# Suspicious Execution Locations
filter3:
Image|contains:
- 'C:\Windows\System32'
- 'C:\Windows\SysWOW64'
# Suspicious extensions
filter4:
CommandLine|contains:
- '.htm'
- '.hta'
CommandLine|endswith:
- 'mshta.exe'
- 'mshta'
condition: selection_base and ( selection1 or selection2 ) or ( selection_base and not filter3 ) or ( selection_base and not filter4 )
falsepositives:
- Unknown
level: high