heroui logo

Potential Remote File Execution via MSIEXEC

Elastic Detection Rules

View Source
Summary
The rule identifies the execution of the Windows Installer, msiexec.exe, which may be abused by adversaries to install remote MSI packages. By monitoring process starts, network connections, and child processes of msiexec.exe, it aims to detect potential misuse indicative of initial access or defense evasion tactics. The rule captures sequence events to correlate the execution of msiexec.exe with network connections and the spawning of unexpected child processes, while excluding known benign behaviors based on signature and path filtering. The risk score is categorized as low, making it suitable as an initial indicator of suspicious activity. The analytical process includes reviewing suspicious command-line arguments, investigating associated network connections for malicious patterns, and validating process code signatures to distinguish benign from potentially malicious actions.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1566
  • T1566.002
  • T1218
  • T1218.007
Created: 2023-09-28