
Summary
This detection rule identifies malicious use of msiexec.exe, a command-line utility for Windows Installer, which is frequently leveraged by attackers to execute installation packages (.msi) from remote locations. The rspect of remote execution can be concerning, especially as msiexec.exe is often digitally signed by Microsoft, which might provide a false sense of legitimacy. The rule focuses on identifying patterns where an .msi installation command is invoked with a URL, indicating that it is being sourced from a remote location. The detection works by querying endpoint data through Sysmon events to capture any invocation of commands related to .msi files. The structure of the detection mechanism utilizes regular expressions to filter and identify these specific events, allowing for efficient monitoring and alerting of such potentially malicious behaviors.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1218.007
Created: 2024-02-09