Suspicious Cabinet File Execution Via Msdt.EXE
Detects execution of msdt.exe using the "cab" flag which could indicates suspicious diagcab files with embedded answer files leveraging CVE-2022-30190
Sigma rule (View on GitHub)
1title: Suspicious Cabinet File Execution Via Msdt.EXE
2id: dc4576d4-7467-424f-9eee-fd2b02855fe0
3related:
4 - id: 6545ce61-a1bd-4119-b9be-fcbee42c0cf3
5 type: obsolete
6status: test
7description: Detects execution of msdt.exe using the "cab" flag which could indicates suspicious diagcab files with embedded answer files leveraging CVE-2022-30190
8references:
9 - https://twitter.com/nas_bench/status/1537896324837781506
10 - https://github.com/GossiTheDog/ThreatHunting/blob/e85884abbf05d5b41efc809ea6532b10b45bd05c/AdvancedHuntingQueries/DogWalk-DiagCab
11 - https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-9015912909545e72ed42cbac4d1e96295e8964579c406d23fd9c47a8091576a0
12 - https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd
13author: Nasreddine Bencherchali (Nextron Systems), GossiTheDog, frack113
14date: 2022-06-21
15modified: 2024-03-13
16tags:
17 - attack.defense-evasion
18 - attack.t1202
19logsource:
20 category: process_creation
21 product: windows
22detection:
23 selection_img:
24 - Image|endswith: '\msdt.exe'
25 - OriginalFileName: 'msdt.exe'
26 selection_cmd:
27 CommandLine|contains|windash: ' -cab '
28 condition: all of selection_*
29falsepositives:
30 - Legitimate usage of ".diagcab" files
31level: medium
References
Related rules
- Custom File Open Handler Executes PowerShell
- Diagnostic Library Sdiageng.DLL Loaded By Msdt.EXE
- Findstr Launching .lnk File
- Indirect Command Execution From Script File Via Bash.EXE
- Indirect Inline Command Execution Via Bash.EXE