Detectionmediumtest

MSI Installation From Suspicious Locations

Detects MSI package installation from suspicious locations

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Nasreddine Bencherchali (Nextron Systems)Created Wed Aug 31Updated Mon Oct 23c7c8aa1c-5aff-408e-828b-998e3620b341windows
Log Source
Windowsapplication
ProductWindows← raw: windows
Serviceapplication← raw: application
Detection Logic
Detection Logic3 selectors
detection:
    selection:
        Provider_Name: 'MsiInstaller'
        EventID:
            - 1040
            - 1042
        Data|contains:
            # Add more suspicious paths
            - ':\Windows\TEMP\'
            - '\\\\'
            - '\Desktop\'
            - '\PerfLogs\'
            - '\Users\Public\'
            # - '\AppData\Local\Temp\'  # too many FPs
            # - '\Downloads\'  # too many FPs, typical legitimate staging directory
    filter_winget:
        Data|contains: '\AppData\Local\Temp\WinGet\'
    filter_updhealthtools:
        Data|contains: 'C:\Windows\TEMP\UpdHealthTools.msi'
    condition: selection and not 1 of filter_*
False Positives

False positives may occur if you allow installation from folders such as the desktop, the public folder or remote shares. A baseline is required before production use.

MITRE ATT&CK
Rule Metadata
Rule ID
c7c8aa1c-5aff-408e-828b-998e3620b341
Status
test
Level
medium
Type
Detection
Created
Wed Aug 31
Modified
Mon Oct 23
Path
rules/windows/builtin/application/msiinstaller/win_msi_install_from_susp_locations.yml
Raw Tags
attack.execution
View on GitHub