
Summary
This detection rule identifies potential misuse of the Windows application shimming feature via the `sdbinst.exe` process, which is designed for backward compatibility of software. Attackers exploit this feature to persistently execute arbitrary code, hiding malicious activities within legitimate processes. The rule triggers alerts for `sdbinst.exe` invocations that lack common benign flags, indicating potential malicious behavior. It emphasizes the need for thorough investigation of suspicious process executions, review of parent processes, and verification of user accounts, as well as correlation with security logs. The analysis also covers possible false positives from legitimate software updates or administrative tasks using `sdbinst.exe`, urging identification and documentation of those exceptions.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
- User Account
- Network Traffic
- File
ATT&CK Techniques
- T1546
- T1546.011
Created: 2020-02-18