| Title | MSHTA spwaned by SVCHOST as seen in LethalHTA |
|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
| Description | Detects MSHTA.EXE spwaned by SVCHOST described in report |
| ATT&CK Tactic |
|
| ATT&CK Technique | |
| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
| Trigger | There is no Trigger for this technique yet. |
| Severity Level | high |
| False Positives | |
| Development Status | experimental |
| References | - [https://codewhitesec.blogspot.com/2018/07/lethalhta.html](https://codewhitesec.blogspot.com/2018/07/lethalhta.html)
|
| Author | Markus Neis |
## Detection Rules
### Sigma rule
```
title: MSHTA spwaned by SVCHOST as seen in LethalHTA
status: experimental
description: Detects MSHTA.EXE spwaned by SVCHOST described in report
references:
- https://codewhitesec.blogspot.com/2018/07/lethalhta.html
author: Markus Neis
date: 2018/06/07
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 1
ParentImage: '*\svchost.exe'
Image: '*\mshta.exe'
condition: selection
falsepositives:
- Unknown
level: high
```
### Kibana query
```
(EventID:"1" AND ParentImage.keyword:*\\\\svchost.exe AND Image.keyword:*\\\\mshta.exe)
```
### X-Pack Watcher
```
curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_xpack/watcher/watch/MSHTA-spwaned-by-SVCHOST-as-seen-in-LethalHTA <