heroui logo

Windows MSC EvilTwin Directory Path Manipulation

Splunk Security Content

View Source
Summary
The detection rule 'Windows MSC EvilTwin Directory Path Manipulation' identifies potential exploitation attempts involving manipulation of directory paths in malicious MSC files, specifically targeting the CVE-2025-26633 vulnerability. This technique involves creating MSC files that leverage the MUIPath parameter to bypass security controls by using unconventional command-line parameters that include unusual spaces in paths pointing to Windows System32 or suspicious additional parameters. If detected, this behavior could indicate an attempt by an attacker to execute arbitrary code with elevated privileges via DLL side-loading or path traversal. The rule is based on telemetry data from Sysmon and Windows Event Logs and is designed to flag execution patterns of mmc.exe that match certain regex criteria.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1218
  • T1036.005
  • T1203
Created: 2025-04-17