Attachment: Embedded VBScript in MHT file (unsolicited)
MHT files can be used to run VBScript, which can run malicious code.
Sublime rule (View on GitHub)
1name: "Attachment: Embedded VBScript in MHT file (unsolicited)"
2description: |
3 MHT files can be used to run VBScript, which can run malicious code.
4references:
5 - "https://delivr.to/payloads?id=edc7744f-78bc-4c18-9554-58c35ba9aca5"
6type: "rule"
7severity: "medium"
8source: |
9 type.inbound
10 and any(attachments,
11 (
12 .file_extension =~ "mht"
13 or .file_extension in~ $file_extensions_common_archives
14 )
15
16 // ensure there's an mht file (if it's in an archive)
17 and any(file.explode(.), .file_extension =~ "mht")
18 and any(file.explode(.),
19 any(.scan.html.scripts, .language == "VBScript")
20 )
21 )
22 and (
23 not profile.by_sender().solicited
24 or (
25 profile.by_sender().any_messages_malicious_or_spam
26 and not profile.by_sender().any_messages_benign
27 )
28 )
29attack_types:
30 - "Malware/Ransomware"
31tactics_and_techniques:
32 - "Evasion"
33 - "Scripting"
34detection_methods:
35 - "Archive analysis"
36 - "File analysis"
37 - "HTML analysis"
38 - "Sender analysis"
39id: "b30353a6-773e-5b6d-9252-751b5bc95799"