EXPLORE
← Back to Explore
T1218.005

Mshta

Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility. There are several examples of different types of threats leveraging mshta.exe during initial compromise and for execution of code (Citation: Cylance Dust Storm) (Citation: Red Canary HTA Abuse Part Deux) (Citation: FireEye Attacks Leveraging HTA) (Citation: Airbus Security Kovter Analysis) (Citation: FireEye FIN7 April 2017) Mshta.exe is a utility that execut...

Windows
46
Detections
4
Sources
17
Threat Actors

BY SOURCE

26elastic12splunk_escu7sigma1crowdstrike_cql

PROCEDURES (29)

Script Execution Monitoring4 detections

Auto-extracted: 4 detections for script execution monitoring

Download3 detections

Auto-extracted: 3 detections for download

Child Process3 detections

Auto-extracted: 3 detections for child process

Privilege2 detections

Auto-extracted: 2 detections for privilege

Parent Process2 detections

Auto-extracted: 2 detections for parent process

Remote2 detections

Auto-extracted: 2 detections for remote

Exfiltrat2 detections

Auto-extracted: 2 detections for exfiltrat

Bypass2 detections

Auto-extracted: 2 detections for bypass

Network Connection Monitoring2 detections

Auto-extracted: 2 detections for network connection monitoring

Phish2 detections

Auto-extracted: 2 detections for phish

Powershell2 detections

Auto-extracted: 2 detections for powershell

Suspicious2 detections

Auto-extracted: 2 detections for suspicious

Process Creation Monitoring2 detections

Auto-extracted: 2 detections for process creation monitoring

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Persist1 detections

Auto-extracted: 1 detections for persist

Http1 detections

Auto-extracted: 1 detections for http

Persist1 detections

Auto-extracted: 1 detections for persist

Bypass1 detections

Auto-extracted: 1 detections for bypass

Privilege1 detections

Auto-extracted: 1 detections for privilege

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Persist1 detections

Auto-extracted: 1 detections for persist

Lateral1 detections

Auto-extracted: 1 detections for lateral

Http1 detections

Auto-extracted: 1 detections for http

Parent Process1 detections

Auto-extracted: 1 detections for parent process

Inject1 detections

Auto-extracted: 1 detections for inject

Http1 detections

Auto-extracted: 1 detections for http

Inject1 detections

Auto-extracted: 1 detections for inject

Remote1 detections

Auto-extracted: 1 detections for remote

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

DETECTIONS (46)

Cisco NVM - MSHTML or MSHTA Network Execution Without URL in CLI
splunk_escu
Cisco NVM - Rundll32 Abuse of MSHTML.DLL for Payload Download
splunk_escu
Command and Scripting Interpreter via Windows Scripts
elastichigh
Csc.EXE Execution Form Potentially Suspicious Parent
sigmahigh
Delayed Execution via Ping
elasticlow
Detect mshta inline hta execution
splunk_escu
Detect mshta renamed
splunk_escu
Detect MSHTA Url in Command Line
splunk_escu
Detect Rundll32 Inline HTA Execution
splunk_escu
Execution from Unusual Directory - Command Line
elasticmedium
Execution of a Downloaded Windows Script
elasticmedium
Execution of Persistent Suspicious Program
elasticmedium
HackTool - CACTUSTORCH Remote Thread Creation
sigmahigh
Incoming DCOM Lateral Movement via MSHTA
elastichigh
LOLBin Mshta
crowdstrike_cql
Microsoft Build Engine Started by a Script Process
elasticmedium
MSHTA Execution with Suspicious File Extensions
sigmahigh
Mshta Making Network Connections
elasticmedium
Mshta spawning Rundll32 OR Regsvr32 Process
splunk_escu
Potential Execution via FileFix Phishing Attack
elastichigh
Potential Fake CAPTCHA Phishing Attack
elastichigh
Potential LethalHTA Technique Execution
sigmahigh
Process Activity via Compiled HTML File
elasticmedium
Remotely Hosted HTA File Executed Via Mshta.EXE
sigmahigh
Script Execution via Microsoft HTML Application
elastichigh
Service Control Spawned via Script Interpreter
elasticlow
Suspicious .NET Code Compilation
elasticmedium
Suspicious Execution from a Mounted Device
elasticmedium
Suspicious Execution from VS Code Extension
elasticmedium
Suspicious Explorer Child Process
elasticmedium
Suspicious JavaScript Execution Via Mshta.EXE
sigmahigh
Suspicious JetBrains TeamCity Child Process
elasticmedium
Suspicious Managed Code Hosting Process
elastichigh
Suspicious Microsoft HTML Application Child Process
elastichigh
Suspicious MS Office Child Process
elasticmedium
Suspicious MS Outlook Child Process
elasticlow
Suspicious mshta child process
splunk_escu
Suspicious MSHTA Child Process
sigmahigh
Suspicious mshta spawn
splunk_escu
Suspicious PDF Reader Child Process
elasticlow
Suspicious ScreenConnect Client Child Process
elasticmedium
Suspicious Windows Command Shell Arguments
elastichigh
Unusual Network Activity from a Windows System Binary
elasticmedium
Windows Mshta Execution In Registry
splunk_escu
Windows MSHTA Writing to World Writable Path
splunk_escu
Windows Process Writing File to World Writable Path
splunk_escu