heroui logo

.msc Executed from Unusual Location

Anvilogic Forge

View Source
Summary
This detection rule identifies potentially malicious activity related to the execution of Microsoft Management Console (MMC) files, specifically .msc files that are being launched from unusual directories. Threat actors can leverage mmc.exe to run these .msc files, which are often used for administrative tasks on Windows systems and may include features for both local and remote management. By monitoring the execution of mmc.exe referencing .msc files that are not located in standard Windows directory paths (specifically outside of C:\Windows\system32 or C:\Windows\SysWOW64), the rule aims to detect possible attempts at hiding malicious activities that exploit legitimate system binaries. The detection logic is implemented using Splunk, focusing on event logs relating to process creation, analyzing execution patterns for any deviations from typical behavior.
Categories
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1218.014
Created: 2024-02-09