2017-03-05 01:47:37 +01:00
|
|
|
title: MSHTA Spawning Windows Shell
|
2017-03-04 14:33:09 -08:00
|
|
|
status: experimental
|
|
|
|
|
description: Detects a Windows command line executable started from MSHTA.
|
2018-01-28 02:24:16 +03:00
|
|
|
references:
|
|
|
|
|
- https://www.trustedsec.com/july-2015/malicious-htas/
|
2017-03-04 14:33:09 -08:00
|
|
|
author: Michael Haag
|
|
|
|
|
logsource:
|
2017-03-13 09:23:08 +01:00
|
|
|
product: windows
|
|
|
|
|
service: sysmon
|
2017-03-04 14:33:09 -08:00
|
|
|
detection:
|
|
|
|
|
selection:
|
|
|
|
|
EventID: 1
|
2017-04-16 12:01:03 +02:00
|
|
|
ParentImage: '*\mshta.exe'
|
2017-03-04 14:33:09 -08:00
|
|
|
Image:
|
|
|
|
|
- '*\cmd.exe'
|
|
|
|
|
- '*\powershell.exe'
|
|
|
|
|
- '*\wscript.exe'
|
|
|
|
|
- '*\cscript.exe'
|
|
|
|
|
- '*\sh.exe'
|
|
|
|
|
- '*\bash.exe'
|
2017-04-13 09:25:34 +02:00
|
|
|
- '*\reg.exe'
|
|
|
|
|
- '*\regsvr32.exe'
|
|
|
|
|
- '*\BITSADMIN*'
|
|
|
|
|
filter:
|
2018-03-25 23:08:28 +02:00
|
|
|
CommandLine:
|
2017-04-13 09:25:34 +02:00
|
|
|
- '*/HP/HP*'
|
|
|
|
|
- '*\HP\HP*'
|
|
|
|
|
condition: selection and not filter
|
2017-09-12 23:54:04 +02:00
|
|
|
fields:
|
|
|
|
|
- CommandLine
|
|
|
|
|
- ParentCommandLine
|
2018-07-20 09:53:55 +03:00
|
|
|
tags:
|
|
|
|
|
- attack.defense_evasion
|
|
|
|
|
- attack.execution
|
|
|
|
|
- attack.t1170
|
2017-03-04 14:33:09 -08:00
|
|
|
falsepositives:
|
2017-04-13 09:25:34 +02:00
|
|
|
- Printer software / driver installations
|
2017-03-04 14:33:09 -08:00
|
|
|
level: high
|
2017-04-13 09:25:34 +02:00
|
|
|
|