
Summary
This rule detects the execution of 'mshta.exe' when used with inline protocols like 'JavaScript', 'VBScript', and 'About'. It leverages data from Endpoint Detection and Response (EDR) agents to monitor command-line arguments and process information associated with 'mshta.exe'. This executable can be manipulated to run harmful scripts, which may result in unauthorized execution of code or escalation of privileges within a system. The detection aims to identify such potentially malicious activities that can compromise system integrity or allow persistent threats in an enterprise environment.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1218
- T1218.005
Created: 2024-12-10