
Summary
This rule detects the execution of potential LethalHTA techniques, specifically focusing on scenarios where the process `mshta.exe` is initiated by `svchost.exe`. The `mshta.exe` (Microsoft HTML Application Host) can be exploited in various attack scenarios, particularly in delivering malicious payloads via HTML applications. The detection is configured to monitor process creation logs and specifically looks for the parent-child relationship between `svchost.exe` and `mshta.exe`. The high severity level of this detection signifies a notable potential threat, as attackers commonly utilize such techniques to bypass security defenses and perform actions that could lead to further compromise of the system. The rule is relevant for Windows environments and follows established guidelines in threat detection, specifically addressing defense evasion tactics noted in the ATT&CK framework.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2018-06-07