-
-
Notifications
You must be signed in to change notification settings - Fork 205
Expand file tree
/
Copy pathdefense_evasion_suspicious_html_application_script_execution.yml
More file actions
59 lines (55 loc) · 1.89 KB
/
defense_evasion_suspicious_html_application_script_execution.yml
File metadata and controls
59 lines (55 loc) · 1.89 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
name: Suspicious HTML Application script execution
id: 4ec64ac2-851d-41b4-b7d2-910c21de334d
version: 1.0.8
description: |
Identifies the execution of scripts via Microsoft HTML Application Host interpreter. Adversaries
can proxy the execution of arbitrary script code through a trusted, signed utility to evade defenses.
labels:
tactic.id: TA0005
tactic.name: Defense Evasion
tactic.ref: https://attack.mitre.org/tactics/TA0005/
technique.id: T1218
technique.name: System Binary Proxy Execution
technique.ref: https://attack.mitre.org/techniques/T1218/
subtechnique.id: T1218.005
subtechnique.name: Mshta
subtechnique.ref: https://attack.mitre.org/techniques/T1218/005/
references:
- https://redcanary.com/threat-detection-report/techniques/mshta/
- https://www.ired.team/offensive-security/code-execution/t1170-mshta-code-execution
condition: >
spawn_process and
(ps.name ~= 'mshta.exe' or ps.pe.file.name ~= 'mshta.exe') and
ps.cmdline imatches
(
'*WScript.Shell*',
'*mshtml*RunHTMLApplication*',
'*http*',
'*https*',
'*hXXps',
'*ftp*',
'*.run*',
'*window.close*',
'*mshtml*',
'*).Exec()*',
'*script*eval(*',
'*script*GetObject*',
'*vbscript*',
'*\\Users\\*\\Downloads\\*.hta*',
'*.rtf*',
'*.bat*',
'*.dll*',
'*.zip*',
'*.jpg*',
'*.png*',
'*.lnk*',
'*.doc*',
'*.xls*'
) and
ps.parent.exe not imatches '?:\\Program Files (x86)\\Microsoft Office\\Office*\\MSACCESS.EXE'
action:
- name: kill
output: >
Suspicious HTML Application script execution by mshta process with command line arguments %ps.cmdline
severity: high
min-engine-version: 3.0.0