
Summary
The detection rule identifies the execution of Microsoft Management Console (.msc) files from suspicious paths on Windows systems. While .msc files are typically used for legitimate system administration, their execution by non-administrative processes or from unusual locations can indicate potential malicious actions. Examples of such actions include living-off-the-land tactics, unauthorized persistence mechanisms, or abusive automated tasks. The rule leverages process creation events, including command-line arguments and parent-child process relationships, to distinguish between normal and potentially harmful usage. The alerts generated require contextual investigation, considering factors such as the initiating process, involved systems, and any associated network or system activities—thereby addressing the possibility of legit administrative tasks triggering alerts.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- User Account
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1218.014
Created: 2026-02-03