
Summary
The rule targets the potential misuse of the Windows Installer utility, msiexec.exe, which can be exploited by adversaries to execute malicious payloads under the guise of legitimate installation processes. Specifically, it focuses on the quiet installation method, allowing msiexec to perform actions without user interaction or visible output, thus evading detection. The detection logic captures instances where msiexec is called with specific command line arguments indicating ‘quiet’ installations. Additionally, filters are applied to exclude benign scenarios, such as typical Windows update processes or installations from system and user temporary folders. The rule ensures that a variety of common methods of invoking msiexec in both interactive and quiet modes are accounted for while minimizing false positives from legitimate software behavior.
Categories
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1218.007
Created: 2022-01-16