Invoke-Obfuscation Via Use MSHTA

Detects Obfuscated Powershell via use MSHTA in Scripts

Sigma rule (View on GitHub)

 1title: Invoke-Obfuscation Via Use MSHTA
 2id: a4e82ad2-7430-4ee8-b858-6ad6099773fa
 3related:
 4    - id: 7e9c7999-0f9b-4d4a-a6ed-af6d553d4af4
 5      type: derived
 6description: Detects Obfuscated Powershell via use MSHTA in Scripts
 7status: unsupported
 8author: Nikita Nazarov, oscd.community
 9date: 2020/10/09
10modified: 2022/03/08
11references:
12    - https://github.com/SigmaHQ/sigma/issues/1009 #(Task31)
13logsource:
14    product: windows
15    category: driver_load
16detection:
17    selection:
18        ImagePath|contains|all:
19            - 'set'
20            - '&&'
21            - 'mshta'
22            - 'vbscript:createobject'
23            - '.run'
24            - '(window.close)'
25    condition: selection
26falsepositives:
27    - Unknown
28level: high
29tags:
30    - attack.defense_evasion
31    - attack.t1027
32    - attack.execution
33    - attack.t1059.001

References

Related rules

to-top