heroui logo

Wusa.EXE Executed By Parent Process Located In Suspicious Location

Sigma Rules

View Source
Summary
This detection rule identifies instances where the Windows Update Standalone Installer (wusa.exe) is executed by a parent process located in suspicious file paths. The key intent behind this detection is to counteract a potential tactic employed by attackers who may exploit the wusa.exe utility to circumvent User Account Control (UAC) mechanisms within Windows. By hijacking this legitimate system process, malicious actors could leverage the elevated privileges granted to it by duplicating access tokens associated with wusa.exe. The rule specifically screens for wusa.exe being run in less typical directories like public user folders or temporary directories, indicating a potential compromise or malicious usage. It enforces this by ensuring the parent process path matches known suspicious patterns while also confirming that the command line used includes the handling of .msu files, which are typical for Microsoft Update Standalone Installer files. This behavior is indicative of advanced persistent threats or unauthorized software launching that could lead to system compromise. The detection logic also mitigates the risk of false positives by filtering out certain parent processes that do not meet the criteria. This detection is at a high confidence level due to the unusual execution context it targets and its relevance to contemporary attack methodologies.
Categories
  • Windows
  • Endpoint
  • On-Premise
Data Sources
  • Process
Created: 2023-11-26