Mshta Executing from Registry
Detects a Mshta executing code from the registry
Sigma rule (View on GitHub)
1title: Mshta Executing from Registry
2id: 8f6de20d-0616-4cf1-875e-24ccabb2e78c
3status: Experimental
4description: Detects a Mshta executing code from the registry
5author: TheDFIRReport
6references:
7 - https://lolbas-project.github.io/lolbas/Binaries/Mshta/
8 - https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts
9date: 2023-01-08
10logsource:
11 category: process_creation
12 product: windows
13detection:
14 selection:
15 CommandLine|contains|all:
16 - 'wscript.shell'
17 - 'new ActiveXObject'
18 - 'regread'
19 Image|endswith: 'mshta.exe'
20 condition: selection
21fields:
22 - CommandLine
23falsepositives:
24 - Unknown
25level: high
26tags:
27 - attack.defense-evasion
28 - attack.t1218.005
References
Related rules
- Csc.EXE Execution Form Potentially Suspicious Parent
- HackTool - CACTUSTORCH Remote Thread Creation
- MSHTA Suspicious Execution 01
- Potential Baby Shark Malware Activity
- Potential LethalHTA Technique Execution