← Back to SOC feed Coverage →

Detects malicious files related to CVE-2017-8759 - file cmd.hta

yara LOW Yara-Rules
communityexploit
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-11T23:00:00Z · Confidence: medium

Hunt Hypothesis

The detection identifies potential exploitation of CVE-2017-8759 through the presence of the malicious cmd.hta file, which could be used to execute arbitrary code. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage attacks leveraging known vulnerabilities.

YARA Rule

rule CVE_2017_8759_Mal_HTA {
   meta:
      description = "Detects malicious files related to CVE-2017-8759 - file cmd.hta"
      author = "Florian Roth"
      reference = "https://github.com/Voulnet/CVE-2017-8759-Exploit-sample"
      date = "2017-09-14"
      hash1 = "fee2ab286eb542c08fdfef29fabf7796a0a91083a0ee29ebae219168528294b5"
   strings:
      $x1 = "Error = Process.Create(\"powershell -nop cmd.exe /c" fullword ascii
   condition:
      ( uint16(0) == 0x683c and filesize < 1KB and all of them )
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

This rule contains 1 string patterns in its detection logic.

References

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/maldocs/Maldoc_CVE_2017_8759.yar