Suspicious Remote AppX Package Locations
Detects an appx package added the pipeline of the "to be processed" packages which is downloaded from a suspicious domain
Sigma rule (View on GitHub)
1title: Suspicious Remote AppX Package Locations
2id: 8b48ad89-10d8-4382-a546-50588c410f0d
3status: experimental
4description: Detects an appx package added the pipeline of the "to be processed" packages which is downloaded from a suspicious domain
5references:
6 - Internal Research
7 - https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
8 - https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting
9 - https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
10author: Nasreddine Bencherchali (Nextron Systems)
11date: 2023/01/11
12modified: 2024/02/09
13tags:
14 - attack.defense_evasion
15logsource:
16 product: windows
17 service: appxdeployment-server
18detection:
19 selection:
20 EventID: 854
21 Path|contains:
22 - '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
23 - 'anonfiles.com'
24 - 'cdn.discordapp.com'
25 - 'cdn.discordapp.com/attachments/'
26 - 'ddns.net'
27 - 'dl.dropboxusercontent.com'
28 - 'ghostbin.co'
29 - 'glitch.me'
30 - 'gofile.io'
31 - 'hastebin.com'
32 - 'mediafire.com'
33 - 'mega.nz'
34 - 'onrender.com'
35 - 'paste.ee'
36 - 'pastebin.com'
37 - 'pastebin.pl'
38 - 'pastetext.net'
39 - 'privatlab.com'
40 - 'privatlab.net'
41 - 'send.exploit.in'
42 - 'sendspace.com'
43 - 'storage.googleapis.com'
44 - 'storjshare.io'
45 - 'supabase.co'
46 - 'temp.sh'
47 - 'transfer.sh'
48 - 'ufile.io'
49 condition: selection
50falsepositives:
51 - Unknown
52level: high
References
Related rules
- BITS Transfer Job Download From File Sharing Domains
- Bypass UAC Using SilentCleanup Task
- Msiexec.EXE Initiated Network Connection Over HTTP
- Network Connection Initiated By AddinUtil.EXE
- Network Connection Initiated By Regsvr32.EXE