heroui logo

Windows MSIX Package Interaction

Splunk Security Content

View Source
Summary
The rule titled 'Windows MSIX Package Interaction' is designed to detect interactions with MSIX packages on Windows systems by monitoring specific event codes related to package handling. Specifically, it tracks EventCode 171 from the Microsoft-Windows-AppXPackaging/Operational logs, which logs actions taken by users when they attempt to interact with MSIX packages, such as clicking to open them or trying to install them. This detection mechanism stems from the increased use of MSIX packages but also acknowledges the potential for abuse by threat actors. By monitoring these events, security teams can gather insights on which MSIX packages users attempted to interact with, potentially spotting nefarious activities. This proactive surveillance identifies potential risks before a malicious package is fully installed, offering an early warning of possible exploits associated with MSIX packages, which have been previously exploited by various threat actors, including FIN7 and Zloader.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1204.002
Created: 2025-08-05