
Summary
The rule "Suspicious AppX Package Locations" aims to detect the addition of AppX packages located in suspicious directories potentially used for malicious purposes. Specifically, it focuses on packages that are queued in the "to be processed" pipeline within Windows environments, where unusual file paths like public directories or user-specific temp folders are considered indicators of potential threat behavior. The detection is based on Event ID 854, which signals suspicious activity from the AppX deployment service. By focusing on common directories that are less secure or frequently targeted by attackers (such as \Public, \Temp, and user profile folders), the rule enhances monitoring for installation behaviors typical of evasive techniques used in malware deployment, such as BazarLoader abuses. The identification of such packages could serve as a precursor to further malicious activity or the execution of malware within a Windows system.
Categories
- Endpoint
- Windows
Data Sources
- Windows Registry
- Application Log
Created: 2023-01-11