heroui logo

Suspicious Mshta.EXE Execution Patterns

Sigma Rules

View Source
Summary
This rule is designed to detect suspicious execution patterns of the mshta.exe process in a Windows environment. The detection logic identifies instances where mshta.exe is invoked, particularly in contexts that could indicate malicious activity. The rule looks for specific characteristics in process creation events, focusing on the parent processes and command lines used during execution. If mshta.exe is being launched by certain suspicious parent processes, or if it is being executed with command lines that reference common directories used in malware execution (such as AppData, ProgramData, or Windows Temp), this rule will trigger an alert. This approach helps in uncovering potential abuse of mshta.exe, which is often used to execute HTA (HTML Application) files, that can deliver payloads or perform unwanted actions on a system.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2021-07-17