| Title | MSHTA spwaned by SVCHOST as seen in LethalHTA | |:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------| | Description | Detects MSHTA.EXE spwaned by SVCHOST described in report | | ATT&CK Tactic | | | ATT&CK Technique | | | Data Needed | | | Trigger | There is no Trigger for this technique yet. | | Severity Level | high | | False Positives | | | Development Status | experimental | | References | | | Author | Markus Neis | ## Detection Rules ### Sigma rule ``` title: MSHTA spwaned by SVCHOST as seen in LethalHTA status: experimental description: Detects MSHTA.EXE spwaned by SVCHOST described in report references: - https://codewhitesec.blogspot.com/2018/07/lethalhta.html author: Markus Neis date: 2018/06/07 logsource: product: windows service: sysmon detection: selection: EventID: 1 ParentImage: '*\svchost.exe' Image: '*\mshta.exe' condition: selection falsepositives: - Unknown level: high ``` ### Kibana query ``` (EventID:"1" AND ParentImage.keyword:*\\\\svchost.exe AND Image.keyword:*\\\\mshta.exe) ``` ### X-Pack Watcher ``` curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_xpack/watcher/watch/MSHTA-spwaned-by-SVCHOST-as-seen-in-LethalHTA <