


While each of these processes warrant a closer look, you’ll be able to assess quicker if there’s anything anomalous going on by verifying what’s in the InitiatingProcessCommandLine column.

This was of course tested – a sample set of over 10,000 endpoints across several environments and spanning 7 days, delivered a total of 37 results. Get a string length larger than 40 characters: this is to weed out false positives, for example where the command line only contains the process in question and a parameter such as /restore or /safe.Add relevant Microsoft Office process names to an array.In this query, the following is performed: InitiatingProcessParentFileName, InitiatingProcessParentCreationTime,

| project Timestamp, DeviceName, InitiatingProcessFolderPath, | where strlen(InitiatingProcessCommandLine) > 40 We only want actual files ran, not Office restore operations etc. | where InitiatingProcessFileName in~ (process) Seeing there is reported exploitation in the wild (ITW), we decided to write a quick Kusto (KQL) rule that allows for hunting in Microsoft Defender ATP. The vulnerability as such resides in this MSHTML component. In practice, the attack basically involves a specially-crafted Microsoft Office document, which includes an ActiveX element, which activates the MSHTML component. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The attacker would then have to convince the user to open the malicious document. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.Īn attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine.
QUERIOUS 2 PATCH CODE
Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. On September 7th 2021, Microsoft published customer guidance concerning CVE-2021-40444, an MSHTML Remote Code Execution Vulnerability:
