Files
blue-team-tools/rules/windows/process_creation/win_html_help_spawn.yml
T

43 lines
1.0 KiB
YAML
Raw Normal View History

title: HTML Help Shell Spawn
2020-04-03 16:56:26 +03:00
id: 52cad028-0ff0-4854-8f67-d25dfcbc78b4
2021-11-27 11:33:14 +01:00
status: test
2020-04-03 16:56:26 +03:00
description: Detects a suspicious child process of a Microsoft HTML Help system when executing compiled HTML files (.chm)
author: Maxim Pavlunin
2021-11-27 11:33:14 +01:00
references:
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/chm-badness-delivers-a-banking-trojan/
2020-04-03 16:56:26 +03:00
date: 2020/04/01
2021-11-27 11:33:14 +01:00
modified: 2021/11/27
2020-04-03 16:56:26 +03:00
logsource:
2021-11-27 11:33:14 +01:00
category: process_creation
product: windows
2020-04-03 16:56:26 +03:00
detection:
2021-11-27 11:33:14 +01:00
selection:
ParentImage: 'C:\Windows\hh.exe'
Image|endswith:
- '\cmd.exe'
- '\powershell.exe'
- '\wscript.exe'
- '\cscript.exe'
- '\regsvr32.exe'
- '\wmic.exe'
- '\rundll32.exe'
condition: selection
2020-04-03 16:56:26 +03:00
fields:
2021-11-27 11:33:14 +01:00
- CommandLine
- ParentCommandLine
2020-04-03 16:56:26 +03:00
falsepositives:
2021-11-27 11:33:14 +01:00
- unknown
2020-04-03 16:56:26 +03:00
level: high
2021-11-27 11:33:14 +01:00
tags:
- attack.defense_evasion
- attack.t1218.001
- attack.t1218.010
- attack.t1218.011
- attack.execution
- attack.t1223 # an old one
- attack.t1059.001
- attack.t1059.003
- attack.t1059.005
- attack.t1059.007
- attack.t1047