
Summary
The Windows MSIExec Remote Download analytic rule is designed to detect instances where the msiexec.exe process is executed with an HTTP or HTTPS URL in the command line, indicating a possible attempt to download and execute files from remote servers which can be a vector for malware delivery. This detection method utilizes data collected from Endpoint Detection and Response (EDR) agents, focusing primarily on logs of process executions that capture command-line arguments. The presence of command-line URLs in executions may suggest potentially malicious activity, leading to unauthorized code execution and system compromise. The analytic rule compiles data from Sysmon EventID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2. The identification of these suspicious command lines is crucial for threat detection teams to respond proactively and protect the network from potential breaches. The rule also allows for filtering based on specific parameters to reduce possible false positives, enhancing its reliability as a detection mechanism.
Categories
- Endpoint
Data Sources
- Windows Registry
- Process
ATT&CK Techniques
- T1218.007
Created: 2024-11-13