Browser Extension Install
Identifies the install of browser extensions. Malicious browser extensions can be installed via app store downloads masquerading as legitimate extensions, social engineering, or by an adversary that has already compromised a system.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2023/08/22"
3integration = ["endpoint", "m365_defender", "sentinel_one_cloud_funnel", "windows"]
4maturity = "production"
5updated_date = "2024/10/15"
6min_stack_version = "8.14.0"
7min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
8
9[rule]
10author = ["Elastic"]
11description = """
12Identifies the install of browser extensions. Malicious browser extensions can be installed via app store downloads
13masquerading as legitimate extensions, social engineering, or by an adversary that has already compromised a system.
14"""
15from = "now-9m"
16index = [
17 "logs-endpoint.events.file-*",
18 "logs-m365_defender.event-*",
19 "logs-sentinel_one_cloud_funnel.*",
20 "logs-windows.sysmon_operational-*",
21 "winlogbeat-*",
22 "endgame-*"
23]
24language = "eql"
25license = "Elastic License v2"
26name = "Browser Extension Install"
27risk_score = 21
28rule_id = "f97504ac-1053-498f-aeaa-c6d01e76b379"
29severity = "low"
30tags = [
31 "Domain: Endpoint",
32 "OS: Windows",
33 "Use Case: Threat Detection",
34 "Tactic: Persistence",
35 "Data Source: Elastic Defend",
36 "Data Source: Elastic Endgame",
37 "Data Source: SentinelOne",
38 "Data Source: Sysmon",
39 "Data Source: Microsoft Defender for Endpoint",
40]
41timestamp_override = "event.ingested"
42type = "eql"
43
44query = '''
45file where host.os.type == "windows" and event.type : "creation" and
46(
47 /* Firefox-Based Browsers */
48 (
49 file.name : "*.xpi" and
50 file.path : "?:\\Users\\*\\AppData\\Roaming\\*\\Profiles\\*\\Extensions\\*.xpi" and
51 not
52 (
53 process.name : "firefox.exe" and
54 file.name : ("langpack-*@firefox.mozilla.org.xpi", "*@dictionaries.addons.mozilla.org.xpi")
55 )
56 ) or
57 /* Chromium-Based Browsers */
58 (
59 file.name : "*.crx" and
60 file.path : "?:\\Users\\*\\AppData\\Local\\*\\*\\User Data\\Webstore Downloads\\*"
61 )
62)
63'''
64
65
66[[rule.threat]]
67framework = "MITRE ATT&CK"
68[[rule.threat.technique]]
69id = "T1176"
70name = "Browser Extensions"
71reference = "https://attack.mitre.org/techniques/T1176/"
72
73
74[rule.threat.tactic]
75id = "TA0003"
76name = "Persistence"
77reference = "https://attack.mitre.org/tactics/TA0003/"
Related rules
- Adobe Hijack Persistence
- Creation of a Hidden Local User Account
- Creation or Modification of a new GPO Scheduled Task or Service
- Image File Execution Options Injection
- Installation of Custom Shim Databases