Mshta Executing from Registry

Detects a Mshta executing code from the registry

Sigma rule (View on GitHub)

 1title: Mshta Executing from Registry
 2id: 8f6de20d-0616-4cf1-875e-24ccabb2e78c
 3status: Experimental
 4description: Detects a Mshta executing code from the registry
 5author: TheDFIRReport
 6references:
 7    - https://lolbas-project.github.io/lolbas/Binaries/Mshta/
 8    - https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts
 9date: 2023-01-08
10logsource:
11    category: process_creation
12    product: windows
13detection:
14    selection:
15        CommandLine|contains|all:
16            - 'wscript.shell'
17            - 'new ActiveXObject'
18            - 'regread'
19        Image|endswith: 'mshta.exe'
20    condition: selection
21fields:
22    - CommandLine
23falsepositives:
24    - Unknown
25level: high
26tags:
27    - attack.defense-evasion
28    - attack.t1218.005

References

Related rules

to-top