Skip to content

Commit 6b827f1

Browse files
committed
feat(rules): Add Suspicious MSHTA execution via HTML smuggling rule
Identifies suspicious execution of mshta process initiated by a web browser as part of an HTML smuggling attack chain. This behavior is strongly associated with multi-stage malware delivery and execution via phishing-driven HTML smuggling.
1 parent dedd157 commit 6b827f1

2 files changed

Lines changed: 47 additions & 1 deletion

File tree

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
name: Suspicious MSHTA execution via HTML smuggling
2+
id: 2d7c76e9-1e59-4413-9ff3-624b9d71e6d0
3+
version: 1.0.0
4+
description: |
5+
Identifies suspicious execution of mshta process initiated by a web browser as
6+
part of an HTML smuggling attack chain.
7+
This behavior is strongly associated with multi-stage malware delivery and execution
8+
via phishing-driven HTML smuggling.
9+
labels:
10+
tactic.id: TA0002
11+
tactic.name: Execution
12+
tactic.ref: https://attack.mitre.org/tactics/TA0002/
13+
technique.id: T1204
14+
technique.name: User Execution
15+
technique.ref: https://attack.mitre.org/techniques/T1204/
16+
subtechnique.id: T1204.001
17+
subtechnique.name: Malicious Link
18+
subtechnique.ref: https://attack.mitre.org/techniques/T1204/001/
19+
references:
20+
- https://www.securonix.com/blog/jssmuggler-multi-stage-hidden-iframes-obfuscated-javascript-silent-redirectors-netsupport-rat-delivery/
21+
22+
condition: >
23+
sequence
24+
maxspan 2m
25+
by ps.uuid
26+
|spawn_process and
27+
ps.name ~= 'mshta.exe' and ps.parent.name iin web_browser_binaries and
28+
ps.cmdline imatches ('*http://*', '*https://*', '*\\webdav\\*', '*\\DavWWWRoot\\*', '\\\\*@*\\*')
29+
|
30+
|create_file and
31+
file.path imatches
32+
(
33+
'?:\\Users\\*\\AppData\\Local\\*',
34+
'?:\\Users\\*\\AppData\\Roaming\\*',
35+
'?:\\Users\\*\\AppData\\Local\\Temp\\*',
36+
'?:\\Windows\\Temp\\*',
37+
'?:\\Users\\Public\\*'
38+
)
39+
|
40+
|spawn_process and ps.name iin ('powershell.exe', 'pwsh.exe', 'cmd.exe', 'rundll32.exe', 'mshta.exe', 'regsvr32.exe')|
41+
action:
42+
- name: kill
43+
44+
severity: high
45+
46+
min-engine-version: 3.0.0

rules/macros/macros.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@
212212
- macro: web_browser_binaries
213213
list: [
214214
chrome.exe, firefox.exe, msedge.exe, iexplore.exe, opera.exe,
215-
brave.exe, microsoftedge.exe, chromium.exe, safari.exe
215+
brave.exe, microsoftedge.exe, chromium.exe, safari.exe, vivaldi.exe
216216
]
217217

218218
- macro: web_browser_cred_stores

0 commit comments

Comments
 (0)