
Summary
This analytic rule aims to detect suspicious behavior where the `mshta.exe` process spawns child processes `rundll32` or `regsvr32`. This behavior is often associated with malware techniques, notably used by threats like Trickbot to execute malicious DLLs. The detection leverages data from Endpoint Detection and Response (EDR) solutions, utilizing fields such as process GUID, process name, and parent process details to identify potential attacks. By monitoring these specific process interactions, the rule helps identify instances of malicious payload execution which can lead to further system compromise, privilege escalation, or additional malware infection.
Categories
- Endpoint
- Windows
- On-Premise
Data Sources
- Windows Registry
- Process
- File
- Application Log
- Sensor Health
ATT&CK Techniques
- T1218
- T1218.005
Created: 2024-11-13