
Summary
This rule is designed to detect the execution of obfuscated PowerShell commands aimed at installing MSI packages through the Windows Installer COM object (`WindowsInstaller.Installer`). The obfuscation techniques utilized include string manipulations to hide functionality, such as using string insertion to construct class names and correcting malformed URLs during runtime. This method is typically associated with malware loaders or droppers that seek to evade static detection mechanisms by obscuring their intent within dynamically generated strings. Additionally, the rule observes the usage of `InstallProduct` in conjunction with hidden window execution and suppressed user interface interactions, which often indicates a malicious software installation attempt without user consent. Overall, the detection methodology primarily focuses on signatures linked to the process creation of the PowerShell environment alongside the interaction with the Windows Installer COM API in a suspicious manner.
Categories
- Windows
- Cloud
- Endpoint
Data Sources
- Process
- Script
Created: 2025-05-27