
Summary
The detection rule 'Suspicious msbuild path' identifies instances where msbuild.exe is executed from a non-standard path, leveraging data from Endpoint Detection and Response (EDR) tools. Attackers often abuse msbuild.exe to execute malicious payloads, making its execution from unusual locations a potential indicator of compromise. The rule uses specific event log data such as Sysmon EventID 1 and Windows Event Log Security 4688 to trace process creation activities. The rule is designed to flag any process execution that deviates from typical msbuild.exe paths, thus alerting on potential malicious activity that could lead to further compromises within the system. Implementing this rule requires adequate logging and the normalization of data through Splunk's common information model (CIM). Users are advised to baseline msbuild.exe usage to minimize false positives from legitimate applications.
Categories
- Endpoint
Data Sources
- Process
- Windows Registry
- Application Log
- Logon Session
ATT&CK Techniques
- T1127.001
- T1036
- T1127
- T1036.003
Created: 2024-11-13