
Summary
This detection rule focuses on identifying suspicious execution of the hh.exe process, which is associated with Compiled HTML files (CHM). Adversaries can exploit CHM files to conceal malicious payloads and execute them on victim machines. This rule utilizes logs from Windows event IDs to detect instances where hh.exe attempts to access remote CHM files, indicating potential misuse. The detection logic is designed for Splunk and filters events based on specific conditions related to the process name 'hh.exe' and checks for URLs that imply remote access. The technique referenced (T1218.001) is about using system binaries to achieve defense evasion through compiled HTML files. Monitoring these actions can help in identifying and thwarting potential attacks that leverage this vector.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Scheduled Job
ATT&CK Techniques
- T1218.001
Created: 2024-02-09