
Summary
This rule detects the suspicious usage of the "mshtml.dll" library, specifically targeting the illegal execution of commands that utilize the RunHTMLApplication export to run arbitrary code. Various protocol handlers such as vbscript, javascript, file, and http may be exploited through these commands. The detection focuses on the process creation events in Windows, identifying instances where command lines contain sequences that could indicate an abuse of the mshtml functionalities. By monitoring specific command line patterns—especially those that suggest navigation to parent directories (indicated by '..') and specific mentions of RunHTMLApplication—the rule aims to flag potentially malicious activities associated with this particular DLL. The implications of such exploits can lead to significant security breaches, hence marking the alert level as high.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Command
Created: 2022-08-14