
Summary
This detection rule identifies instances where `InstallUtil.exe` is used with the `/u` (uninstall) switch to make a remote network connection. This behavior could signify malicious activity, as attackers often exploit legitimate utilities to execute arbitrary code, bypass security controls, or install backdoors. The rule uses Event Analysis from Sysmon (specifically Event ID 1 for process creation and Event ID 3 for network connections) to detect these activities across endpoints within a designated timeframe. Any identified behaviors should be closely monitored as they can lead to data exfiltration or further lateral movement within a network, reinforcing the need for proactive security measures.
Categories
- Windows
- Endpoint
Data Sources
- Process
- Network Traffic
ATT&CK Techniques
- T1218.004
- T1218
Created: 2024-12-10