Skip to content

Commit

Permalink
Merge PR SigmaHQ#4719 from @joshnck - Update Rules Related To RunHTML…
Browse files Browse the repository at this point in the history
…Application Abuse

update: Mshtml.DLL RunHTMLApplication Suspicious Usage - Merge overlapping rules and enhance logic to account for new reported bypass
remove: Rundll32 JS RunHTMLApplication Pattern
remove: Suspicious Rundll32 Script in CommandLine 
---------

Co-authored-by: nasbench <[email protected]>
  • Loading branch information
joshnck and nasbench authored Feb 26, 2024
1 parent 906797e commit b7ea912
Show file tree
Hide file tree
Showing 3 changed files with 20 additions and 9 deletions.
Original file line number Diff line number Diff line change
@@ -1,11 +1,12 @@
title: Rundll32 JS RunHTMLApplication Pattern
id: 9f06447a-a33a-4cbe-a94f-a3f43184a7a3
status: test
status: deprecated
description: Detects suspicious command line patterns used when rundll32 is used to run JavaScript code
references:
- http://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_DETECTION_BYPASS.txt
- https://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_TROJAN.WIN32.POWESSERE.G_MITIGATION_BYPASS_PART2.txt
author: Florian Roth (Nextron Systems)
date: 2022/01/14
date: 2024/02/23
tags:
- attack.defense_evasion
logsource:
Expand All @@ -16,7 +17,8 @@ detection:
CommandLine|contains|all:
- 'rundll32'
- 'javascript'
- '..\..\mshtml,RunHTMLApplication'
- '..\..\mshtml,'
- 'RunHTMLApplication'
selection2:
CommandLine|contains: ';document.write();GetObject("script'
condition: 1 of selection*
Expand Down
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
title: Suspicious Rundll32 Script in CommandLine
id: 73fcad2e-ff14-4c38-b11d-4172c8ac86c7
status: test
status: deprecated
description: Detects suspicious process related to rundll32 based on arguments
references:
- https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52
- https://github.com/redcanaryco/atomic-red-team/blob/cd3690b100a495885c407282d0c94c85f48a8a2e/atomics/T1218.011/T1218.011.md
author: frack113, Zaw Min Htun (ZETA)
date: 2021/12/04
modified: 2023/02/03
modified: 2024/02/23
tags:
- attack.defense_evasion
- attack.t1218.011
Expand Down
Original file line number Diff line number Diff line change
@@ -1,16 +1,23 @@
title: Mshtml DLL RunHTMLApplication Abuse
title: Mshtml.DLL RunHTMLApplication Suspicious Usage
id: 4782eb5a-a513-4523-a0ac-f3082b26ac5c
related:
- id: 9f06447a-a33a-4cbe-a94f-a3f43184a7a3
type: derived
type: obsoletes
- id: 73fcad2e-ff14-4c38-b11d-4172c8ac86c7
type: obsoletes
status: test
description: Detects suspicious command line using the "mshtml.dll" RunHTMLApplication export to run arbitrary code via different protocol handlers (vbscript, javascript, file, htpp...)
description: |
Detects execution of commands that leverage the "mshtml.dll" RunHTMLApplication export to run arbitrary code via different protocol handlers (vbscript, javascript, file, http...)
references:
- https://twitter.com/n1nj4sec/status/1421190238081277959
author: Nasreddine Bencherchali (Nextron Systems)
- https://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_TROJAN.WIN32.POWESSERE.G_MITIGATION_BYPASS_PART2.txt
- http://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_DETECTION_BYPASS.txt
author: Nasreddine Bencherchali (Nextron Systems), Florian Roth (Nextron Systems), Josh Nickels, frack113, Zaw Min Htun (ZETA)
date: 2022/08/14
modified: 2024/02/23
tags:
- attack.defense_evasion
- attack.execution
logsource:
category: process_creation
product: windows
Expand All @@ -19,6 +26,8 @@ detection:
CommandLine|contains|all:
- '\..\'
- 'mshtml'
CommandLine|contains:
- '#135'
- 'RunHTMLApplication'
condition: selection
falsepositives:
Expand Down

0 comments on commit b7ea912

Please sign in to comment.