Skip to content

Commit 3de9456

Browse files
authored
[Rule Tuning] Script Execution via Microsoft HTML Application (#4950)
1 parent a9ad669 commit 3de9456

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

rules/windows/defense_evasion_script_via_html_app.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/09/09"
33
integration = ["windows", "system", "sentinel_one_cloud_funnel", "m365_defender"]
44
maturity = "production"
5-
updated_date = "2025/03/20"
5+
updated_date = "2025/07/21"
66

77
[rule]
88
author = ["Elastic"]
@@ -100,7 +100,7 @@ process where host.os.type == "windows" and event.type == "start" and
100100
) or
101101
102102
(process.name : "mshta.exe" and
103-
not process.command_line : ("*.hta*", "*.htm*", "-Embedding") and process.args_count >=2) or
103+
not process.command_line : ("*.hta*", "*.htm*", "-Embedding") and ?process.args_count >=2) or
104104
105105
/* Execution of HTA file downloaded from the internet */
106106
(process.name : "mshta.exe" and process.command_line : "*\\Users\\*\\Downloads\\*.hta*") or

0 commit comments

Comments
 (0)