
Summary
This analytic rule focuses on detecting the execution of mshta.exe through registry entries that may indicate malicious activity. It specifically monitors registry activity logs for references to "mshta," "javascript," "vbscript," and "WScript.Shell". Such behavior is relevant as it can signify potential fileless malware attacks, where attackers use encoded scripting techniques to maintain persistence without relying on traditional file storage. Notably, threats such as Kovter may utilize these methods to execute without files, making them harder to detect. The rule employs Sysmon logs to identify unusual registry modifications, providing an effective approach for tracking fileless threats that leverage benign-looking executable processes to carry out malicious actions on Windows systems.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Script
ATT&CK Techniques
- T1218.005
Created: 2024-11-13