Skip to content

Commit e624865

Browse files
committed
feat(rules): Suspicious HTML Application script execution
Identifies the execution of scripts via Microsoft HTML Application Host interpreter. Adversaries can proxy the execution of arbitrary script code through a trusted, signed utility to evade defenses.
1 parent 1cf8151 commit e624865

File tree

1 file changed

+64
-0
lines changed

1 file changed

+64
-0
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
name: Suspicious HTML Application script execution
2+
id: 4ec64ac2-851d-41b4-b7d2-910c21de334d
3+
version: 1.0.0
4+
description: |
5+
Identifies the execution of scripts via Microsoft HTML Application Host interpreter. Adversaries
6+
can proxy the execution of arbitrary script code through a trusted, signed utility to evade defenses.
7+
labels:
8+
tactic.id: TA0005
9+
tactic.name: Defense Evasion
10+
tactic.ref: https://attack.mitre.org/tactics/TA0005/
11+
technique.id: T1218
12+
technique.name: System Binary Proxy Execution
13+
technique.ref: https://attack.mitre.org/techniques/T1218/
14+
subtechnique.id: T1218.005
15+
subtechnique.name: Mshta
16+
subtechnique.ref: https://attack.mitre.org/techniques/T1218/005/
17+
references:
18+
- https://redcanary.com/threat-detection-report/techniques/mshta/
19+
- https://www.ired.team/offensive-security/code-execution/t1170-mshta-code-execution
20+
21+
condition: >
22+
spawn_process and (ps.child.name ~= 'mshta.exe' or ps.child.pe.file.name ~= 'mshta.exe')
23+
and
24+
ps.child.cmdline imatches
25+
(
26+
'*WScript.Shell*',
27+
'*mshtml*RunHTMLApplication*',
28+
'*http*',
29+
'*https*',
30+
'*hXXps',
31+
'*ftp*',
32+
'*.run*',
33+
'*window.close*',
34+
'*mshta*',
35+
'*mshtml*',
36+
'*).Exec()*',
37+
'*script*eval(*',
38+
'*script*GetObject*',
39+
'*vbscript*',
40+
'*\\Users\\*\\Downloads\\*.hta*',
41+
'*.rtf*',
42+
'*.bat*',
43+
'*.dll*',
44+
'*.zip*',
45+
'*.jpg*',
46+
'*.png*',
47+
'*.lnk*',
48+
'*.doc*',
49+
'*.xls*'
50+
)
51+
and
52+
not
53+
ps.exe imatches
54+
(
55+
'?:\\Program Files (x86)\\Microsoft Office\\Office*\\MSACCESS.EXE'
56+
)
57+
action:
58+
- name: kill
59+
60+
output: >
61+
Suspicious HTML Application script execution by mshta process with command line arguments %ps.child.cmdline
62+
severity: high
63+
64+
min-engine-version: 2.2.0

0 commit comments

Comments
 (0)