heroui logo

Cab File Extraction Via Wusa.EXE From Potentially Suspicious Paths

Sigma Rules

View Source
Summary
The detection rule identifies the execution of the Windows Update Standalone Installer (wusa.exe) utility, particularly focusing on its usage for extracting .cab files with the '/extract' parameter from suspicious file paths. This behavior is indicative of potential malicious activity, as attackers may utilize legitimate system tools to install or execute malicious payloads disguised within cabinet files. The rule targets command line arguments associated with wusa.exe and filters events to those where the command line contains certain directories that could signal unauthorized extraction attempts—specifically, performance logs, public user directories, and temporary folders. The intent is to enhance security by flagging processes that exhibit this suspicious behavior, allowing for timely investigation and mitigation of potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-08-05