Files
blue-team-tools/rules/windows/process_creation/win_lethalhta.yml
T
Thomas Patzke 7602309138 Increased indentation to 4
* Converted (to generic sigma) rules
* Converter outputs by default with indentation 4
2019-03-02 00:14:20 +01:00

19 lines
478 B
YAML

title: MSHTA spwaned by SVCHOST as seen in LethalHTA
status: experimental
description: Detects MSHTA.EXE spwaned by SVCHOST described in report
references:
- https://codewhitesec.blogspot.com/2018/07/lethalhta.html
author: Markus Neis
date: 2018/06/07
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage: '*\svchost.exe'
Image: '*\mshta.exe'
condition: selection
falsepositives:
- Unknown
level: high