
Summary
The detection rule titled 'Msxsl Execution' focuses on identifying potential malicious activities related to the execution of the 'msxsl.exe' executable, which is part of the Microsoft Common Line Transformation utility used in XSL (Extensible Stylesheet Language) processing. This utility may be exploited by malicious actors to execute arbitrary files through embedded scripting capabilities within XSL files, potentially bypassing standard application controls. The rule is designed to trigger on specific events that indicate use of the 'msxsl.exe' process or associated file types like '.xml' and '.xsl'. It collects endpoint data using Splunk's querying capabilities, monitoring child processes and network connections that may indicate suspicious usage of this utility. Given its potential for abuse in a context of defense evasion, detection is essential for preventing the exploitation of trusted components for malicious execution activities. Furthermore, the rule aligns with the MITRE ATT&CK technique T1220 which encompasses defense evasion via XSL script processing.
Categories
- Endpoint
Data Sources
- Process
- Application Log
- User Account
ATT&CK Techniques
- T1220
Created: 2024-02-09