
Summary
The 'Windows InstallUtil Uninstall Option' detection rule targets the execution of the InstallUtil.exe binary with the uninstall switch '/u'. This analytic is crucial for identifying actions that could signify the execution of stealthy or harmful code, potentially avoiding application controls. By monitoring command-line arguments, process names, and their parent processes through Endpoint Detection and Response (EDR) systems, this rule provides visibility into suspicious activities that might lack administrative privileges. If indicated as malicious, such actions can lead to unauthorized code execution, further compromising system integrity or enabling persistent threats. The search involves filtering event data, specifically designed to exclude known benign behaviors, thereby refining the signals associated with potential attacks. The implementation requires comprehensive logging of relevant process information and appropriate application of Splunk's Technology Add-ons to accurately detect these activities.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
- Process
- Application Log
- Command
- File
ATT&CK Techniques
- T1218.004
- T1218
Created: 2024-12-10