Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 5690e73

Browse files
authored
Update detect-suspicious-mshta-usage.md
1 parent 307880b commit 5690e73

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

Execution/detect-suspicious-mshta-usage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ The following query detects when mshta.exe has been run, which might include ill
1212

1313
```Kusto
1414
// mshta.exe script launching processes
15-
ProcessCreationEvents
16-
| where EventTime > ago(7d)
15+
DeviceProcessEvents
16+
| where Timestamp > ago(7d)
1717
and InitiatingProcessFileName =~ 'mshta.exe'
1818
and InitiatingProcessCommandLine contains '<script>'
1919
```
@@ -42,4 +42,4 @@ This query can be used to detect the following attack techniques and tactics ([s
4242

4343
## Contributor info
4444

45-
**Contributor:** Microsoft Threat Protection team
45+
**Contributor:** Microsoft Threat Protection team

0 commit comments

Comments
 (0)