heroui logo

Remote CHM File Download/Execution Via HH.EXE

Sigma Rules

View Source
Summary
This detection rule targets the risk associated with the execution and downloading of remote `.chm` (Compiled HTML Help) files via the `hh.exe` executable on Windows systems. The rule identifies instances where `hh.exe` is used with command line parameters that include web URLs, indicating the potential for executing malicious `.chm` files hosted on the internet. By monitoring the creation of processes that contain the command line arguments referencing HTTP(s) URLs and ensuring the process originates from `hh.exe`, the rule aims to detect and prevent unauthorized or malicious file executions. This behavior is often exploited by attackers to propagate malware or execute phishing strategies, thus marking it as a high-level security concern.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1218.001
Created: 2022-09-29