heroui logo

Potential Arbitrary Command Execution Using Msdt.EXE

Sigma Rules

View Source
Summary
This detection rule targets the execution of arbitrary commands via the Microsoft Diagnostics Tool (msdt.exe), which exploits the "ms-msdt" URL handler. It specifically addresses the vulnerability known as 'Follina' (CVE-2022-30190), allowing malicious actors to run commands on a target system by invoking msdt.exe with specially crafted commands, potentially leading to unwanted execution of unsafe operations. The rule checks if any process is employing the 'msdt.exe' binary and is also looking for specific command-line arguments that signal abnormal behavior, indicative of an attempt to manipulate the tool for command execution. By monitoring process creations involving msdt.exe and specific arguments in the command line, the rule helps in the early detection of exploitation attempts associated with this CVE, thus improving overall system security.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Command
Created: 2022-05-29