Skip to content

Commit dedd157

Browse files
committed
feat(rules): Add Suspicious file delivery via HTML smuggling rule
Detects suspicious file delivery via HTML smuggling, a phishing technique where malicious payloads are embedded inside HTML files and reconstructed on the victim system using browser-side JavaScript. Adversaries abuse spearphishing attachments for initial access while bypassing traditional email and network-based security controls.
1 parent 24a6609 commit dedd157

File tree

1 file changed

+47
-0
lines changed

1 file changed

+47
-0
lines changed
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
name: Suspicious file delivery via HTML smuggling
2+
id: b93b5203-78da-4ffa-9b9d-4bd50b3eca1c
3+
version: 1.0.0
4+
description: |
5+
Detects suspicious file delivery via HTML smuggling, a phishing technique
6+
where malicious payloads are embedded inside HTML files and reconstructed
7+
on the victim system using browser-side JavaScript.
8+
Adversaries abuse spearphishing attachments for initial access while bypassing
9+
traditional email and network-based security controls.
10+
labels:
11+
tactic.id: TA0001
12+
tactic.name: Initial Access
13+
tactic.ref: https://attack.mitre.org/tactics/TA0001/
14+
technique.id: T1566
15+
technique.name: Phishing
16+
technique.ref: https://attack.mitre.org/techniques/T1566/
17+
subtechnique.id: T1566.001
18+
subtechnique.name: Spearphishing Attachment
19+
subtechnique.ref: https://attack.mitre.org/techniques/T1566/001/
20+
references:
21+
- https://www.ired.team/offensive-security/defense-evasion/file-smuggling-with-html-and-javascript
22+
23+
condition: >
24+
sequence
25+
maxspan 45s
26+
by ps.name
27+
|spawn_process and
28+
ps.parent.name ~= 'explorer.exe' and ps.name iin web_browser_binaries and
29+
(ps.args iin ('-url', '--single-element') or (ps.name ~= 'iexplore.exe' and length(ps.args) = 2)) and
30+
ps.cmdline imatches
31+
(
32+
'*?:\\Users\\*\\Downloads\\*.htm*',
33+
'*?:\\Users\\*\\AppData\\Local\\Temp\\*.htm*',
34+
'*?:\\Users\\*\\Content.Outlook\\*.htm*'
35+
)
36+
|
37+
|create_file and
38+
file.extension iin ('.exe', '.iso', '.zip', '.rar', '.7z', '.img', '.vhd', '.js', '.bat',
39+
'.com', '.vbs', '.vbe', '.ps1', '.wsh', '.hta', '.cpl', '.jse', '.scr') and
40+
file.path imatches '?:\\Users\\*\\Downloads\\*'
41+
|
42+
action:
43+
- name: kill
44+
45+
severity: high
46+
47+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)