heroui logo

Windows MsiExec HideWindow Rundll32 Execution

Splunk Security Content

View Source
Summary
This detection rule targets the abnormal execution of the msiexec.exe process with specific command-line parameters /HideWindow and rundll32, which are commonly associated with malicious activity. The rule leverages telemetry from Endpoint Detection and Response (EDR) solutions to detect process creation events. The significance of this detection lies in its association with malware tactics, such as those employed by QakBot, which uses these command-line parameters to mask its operations within seemingly legitimate processes. This behavior could facilitate the download of additional malicious payloads, execution of harmful code, or establishing unauthorized communications with external servers, making it a critical detection mechanism for identifying potential threats on Windows systems.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
  • Windows Registry
ATT&CK Techniques
  • T1218.007
  • T1218
Created: 2024-11-13