heroui logo

Potential MsiExec Masquerading

Sigma Rules

View Source
Summary
This detection rule aims to identify potential masquerading attacks involving the execution of 'msiexec.exe', a legitimate Windows installer utility. The rule triggers when 'msiexec.exe' is executed from directories that are not typically associated with the legitimate installations, thus indicating possible misuse or evasion techniques by malicious actors. Specifically, the rule checks for instances where 'msiexec.exe' is executed from uncommon paths by applying a selection criterion that looks for different conditions of execution, including variations in file path endings and original file name attributes. The detection logic is designed to exclude standard execution paths such as 'C:\Windows\System32\', 'C:\Windows\SysWOW64\', and 'C:\Windows\WinSxS\', which are typically expected for this executable. A high-level alert is generated when these unusual executions are detected, supporting incident response efforts by flagging potentially harmful activities.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2019-11-14