heroui logo

Msxsl.EXE Execution

Sigma Rules

View Source
Summary
This detection rule monitors for the execution of the MSXSL utility on Windows systems. MSXSL is primarily used to process XSL files that define how XML data should be rendered or processed. While this tool can have legitimate uses, it may also be exploited by adversaries to execute unauthorized files, particularly to circumvent security measures such as application whitelisting. With the increasing prevalence of threats that leverage such capabilities, the detection of MSXSL executions becomes critical for maintaining the integrity of systems and data security. The rule identifies any execution of MSXSL by examining processes that terminate with the filename 'msxsl.exe'. This makes the detection relevant for identifying potentially malicious activity while minimizing false positives, given that MSXSL is not commonly installed on default systems due to its deprecation.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1220
Created: 2019-10-21