heroui logo

Invoke-Obfuscation Via Use MSHTA - PowerShell Module

Sigma Rules

View Source
Summary
This detection rule identifies the use of obfuscated PowerShell scripts executed through MSHTA (Microsoft HTML Application Host). The key indicators for this detection include specific payload contents commonly utilized in malicious scripts, such as 'set', '&&', 'mshta', 'vbscript:createobject', '.run', or '(window.close)'. These keywords suggest the presence of actions that may try to obscure the true nature of the script execution and its intent, which can be a tactic employed by attackers aiming to evade detection mechanisms. The rule functions by capturing instances where these specified keywords appear in the payload, thereby allowing for the identification of potentially malicious activity involving obfuscated PowerShell execution via MSHTA.
Categories
  • Windows
  • Endpoint
Data Sources
  • Script
  • Process
Created: 2020-10-08