← Back to SOC feed Coverage →

detect-exploitation-of-cve-2018-8653

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
backdoorexploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-20T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may exploit CVE-2018-8653 to execute arbitrary code remotely via a vulnerable scripting engine, allowing unauthorized access and persistence. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential exploitation of an unpatched critical vulnerability.

KQL Query

DeviceProcessEvents 
| where Timestamp > ago(7d)
and InitiatingProcessFileName =~ "svchost.exe"
and InitiatingProcessCommandLine contains "WinHttpAutoProxySvc"
and FileName !~ "pacjsworker.exe"
and FileName !~ "svchost.exe"
and FileName !~ "WerFault.exe"

Analytic Rule Definition

id: 1f541cc3-2c46-4f2a-9b4b-e082f25ec369
name: detect-exploitation-of-cve-2018-8653
description: |
  This query was originally published in the threat analytics report, CVE-2018-8653 scripting engine vulnerability.
  CVE-2018-8653 is a remote code execution vulnerability found in the scripting engine for several releases of Internet Explorer. An attacker exploiting this CVE could use a malicious webpage to gain the same access rights as the currently logged-in user -- which is particularly problematic if the user is an administrator.
  Microsoft has since addressed this vulnerability.
  The following queries detect possible exploitation of this CVE.
  References:
  https://nvd.nist.gov/vuln/detail/CVE-2018-8653
  https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8653
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
tactics:
- Initial access
- Execution
query: |
  DeviceProcessEvents 
  | where Timestamp > ago(7d)
  and InitiatingProcessFileName =~ "svchost.exe"
  and InitiatingProcessCommandLine contains "WinHttpAutoProxySvc"
  and FileName !~ "pacjsworker.exe"
  and FileName !~ "svchost.exe"
  and FileName !~ "WerFault.exe"

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Execution/detect-exploitation-of-cve-2018-8653.yaml