
Summary
This detection rule targets the execution of '.xbap' (XAML Browser Application) files through the PresentationHost.exe process when initiated from uncommon locations. The concern is that while PresentationHost.exe is a legitimate Windows component primarily used to execute XBAP files, attackers can exploit this functionality by executing malicious XBAP files from unexpected paths, hence bypassing application whitelisting (AWL) measures. The rule employs specific conditions to identify instances of PresentationHost.exe running with command-line arguments containing '.xbap' and originating from locations that are not typical for this executable. It specifies to include events where the command line contains the required patterns while ensuring that the invocation is not from well-known directories like 'C:\Windows\' or 'C:\Program Files'. This approach helps in filtering out benign uses of PresentationHost.exe, such as those occurring from system directories, which could result in false positives. The rule is valuable for detecting potential abuse of browser applications in a Windows environment, contributing to an organization’s defense against execution vulnerabilities associated with unexpected file paths.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-07-01