Skip to content

<<< Hide Navigation Hide TOC >>>

Potential LethalHTA Technique Execution (ed5d72a6-f8f4-479d-ba79-02f6a80d7471)

Detects potential LethalHTA technique where the "mshta.exe" is spawned by an "svchost.exe" process

Galaxy ColorsSigma-Rule...Attack Pat...
Rows: 2
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
Potential LethalHTA Technique Execution (ed5d72a6-f8f4-479d-ba79-02f6a80d7471) Sigma-Rules Mshta - T1218.005 (840a987a-99bd-4a80-a5c9-0cb2baa6cade) Attack Pattern 1
System Binary Proxy Execution - T1218 (457c7820-d331-465a-915e-42f85500ccc4) Attack Pattern Mshta - T1218.005 (840a987a-99bd-4a80-a5c9-0cb2baa6cade) Attack Pattern 2