
Summary
This detection rule identifies the execution of PowerShell commands that attempt to install unsigned AppX packages using the `Add-AppxPackage` or `Add-AppPackage` cmdlets with the `-AllowUnsigned` flag. Such activity is concerning as malicious actors may exploit unsigned packages to run unauthorized applications, bypass security mechanisms, or maintain persistent access to the system. The rule utilizes PowerShell Script Block Logging (EventCode=4104) to capture detailed command content whenever these cmdlets are executed. If a command containing the `-AllowUnsigned` flag is detected, it may indicate a potential security violation, prompting further investigation of the involved processes and user accounts. Because the use of unsigned AppX packages can signify an attempt to bypass regular installation checks, the identification of these events is crucial for safeguarding endpoints from malware and other malicious software.
Categories
- Endpoint
- Windows
Data Sources
- Persona
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1059
- T1547
- T1059.001
- T1547.001
- T1553.005
Created: 2025-08-05