heroui logo

Suspicious JavaScript Execution Via Mshta.EXE

Sigma Rules

View Source
Summary
This rule detects the execution of JavaScript code via the Windows utility `mshta.exe`, which is often exploited by malicious actors for attacks such as executing scripts that may escape standard security policies. `mshta.exe` is a legitimate Microsoft application used to execute HTML Applications (HTA files), but its capability to execute arbitrary code makes it a potential vector for malicious activities. The detection is triggered when any process creation events are logged that involve `mshta.exe`, specifically when the command line contains 'javascript' and the image is verified to be `mshta.exe`. This combination is crucial for identifying potentially harmful script executions that could be used for defense evasion or launching additional attacks.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1218.005
Created: 2019-10-24