Mshta
Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility. There are several examples of different types of threats leveraging mshta.exe during initial compromise and for execution of code (Citation: Cylance Dust Storm) (Citation: Red Canary HTA Abuse Part Deux) (Citation: FireEye Attacks Leveraging HTA) (Citation: Airbus Security Kovter Analysis) (Citation: FireEye FIN7 April 2017) Mshta.exe is a utility that execut...
BY SOURCE
PROCEDURES (29)
Auto-extracted: 4 detections for script execution monitoring
Auto-extracted: 3 detections for download
Auto-extracted: 3 detections for child process
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for parent process
Auto-extracted: 2 detections for remote
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for bypass
Auto-extracted: 2 detections for network connection monitoring
Auto-extracted: 2 detections for phish
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 1 detections for parent process
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for parent process
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for suspicious