Always Install Elevated MSI Spawned Cmd And Powershell
Detects Windows Installer service (msiexec.exe) spawning "cmd" or "powershell"
Sigma rule (View on GitHub)
1title: Always Install Elevated MSI Spawned Cmd And Powershell
2id: 1e53dd56-8d83-4eb4-a43e-b790a05510aa
3status: test
4description: Detects Windows Installer service (msiexec.exe) spawning "cmd" or "powershell"
5references:
6 - https://image.slidesharecdn.com/kheirkhabarovoffzonefinal-181117201458/95/hunting-for-privilege-escalation-in-windows-environment-50-638.jpg
7author: Teymur Kheirkhabarov (idea), Mangatas Tondang (rule), oscd.community
8date: 2020-10-13
9modified: 2022-10-20
10tags:
11 - attack.defense-evasion
12 - attack.privilege-escalation
13 - attack.t1548.002
14logsource:
15 product: windows
16 category: process_creation
17detection:
18 selection_img:
19 - Image|endswith:
20 - '\cmd.exe'
21 - '\powershell.exe'
22 - '\pwsh.exe'
23 - OriginalFileName:
24 - 'Cmd.Exe'
25 - 'PowerShell.EXE'
26 - 'pwsh.dll'
27 selection_parent:
28 ParentImage|contains|all:
29 - '\Windows\Installer\'
30 - 'msi'
31 ParentImage|endswith: 'tmp'
32 condition: all of selection_*
33fields:
34 - Image
35 - ParentImage
36falsepositives:
37 - Unknown
38level: medium
References
Related rules
- Always Install Elevated Windows Installer
- Bypass UAC via Fodhelper.exe
- Explorer NOUACCHECK Flag
- PowerShell Web Access Feature Enabled Via DISM
- Sdclt Child Processes