
Summary
This analytic rule is designed to detect instances of the Windows InstallUtil.exe process establishing remote network connections. The detection leverages data collected from Endpoint Detection and Response (EDR) agents, analyzing both process activity and network telemetry to identify potentially malicious usage of InstallUtil.exe. This binary is often exploited by attackers to run arbitrary code from remote locations, thus posing a significant risk to system integrity. The analytic specifically looks for parent processes, alterations to files, and network connections to ascertain if the activity is legitimate or a precursor to a cyber attack. The detection aims to aid analysts in identifying code execution triggers, prevent system compromises, and mitigate risks of data exfiltration or lateral movement within the organization's network.
Categories
- Endpoint
- Windows
Data Sources
- Pod
- Process
- Network Traffic
ATT&CK Techniques
- T1218.004
- T1218
Created: 2024-12-10