Wusa.EXE Executed By Parent Process Located In Suspicious Location
Detects execution of the "wusa.exe" (Windows Update Standalone Installer) utility by a parent process that is located in a suspicious location. Attackers could instantiate an instance of "wusa.exe" in order to bypass User Account Control (UAC). They can duplicate the access token from "wusa.exe" to gain elevated privileges.
Sigma rule (View on GitHub)
1title: Wusa.EXE Executed By Parent Process Located In Suspicious Location
2id: ef64fc9c-a45e-43cc-8fd8-7d75d73b4c99
3status: experimental
4description: |
5 Detects execution of the "wusa.exe" (Windows Update Standalone Installer) utility by a parent process that is located in a suspicious location.
6 Attackers could instantiate an instance of "wusa.exe" in order to bypass User Account Control (UAC). They can duplicate the access token from "wusa.exe" to gain elevated privileges.
7references:
8 - https://www.fortinet.com/blog/threat-research/konni-campaign-distributed-via-malicious-document
9author: X__Junior (Nextron Systems)
10date: 2023-11-26
11modified: 2024-08-15
12tags:
13 - attack.execution
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection_img:
19 Image|endswith: '\wusa.exe'
20 selection_paths_1:
21 ParentImage|contains:
22 # Note: Add additional suspicious locations to increase coverage
23 - ':\Perflogs\'
24 - ':\Users\Public\'
25 - ':\Windows\Temp\'
26 - '\Appdata\Local\Temp\'
27 - '\Temporary Internet'
28 selection_paths_2:
29 - ParentImage|contains|all:
30 - ':\Users\'
31 - '\Favorites\'
32 - ParentImage|contains|all:
33 - ':\Users\'
34 - '\Favourites\'
35 - ParentImage|contains|all:
36 - ':\Users\'
37 - '\Contacts\'
38 - ParentImage|contains|all:
39 - ':\Users\'
40 - '\Pictures\'
41 filter_main_msu:
42 # Note: We exclude MSU extension files. A better approach is to baseline installation of updates in your env to avoid false negatives.
43 CommandLine|contains: '.msu'
44 condition: selection_img and 1 of selection_paths_* and not 1 of filter_main_*
45falsepositives:
46 - Unknown
47level: high
References
Related rules
- Cab File Extraction Via Wusa.EXE From Potentially Suspicious Paths
- Potential DLL Injection Via AccCheckConsole
- Windows Binary Executed From WSL
- Data Export From MSSQL Table Via BCP.EXE
- Potentially Suspicious Rundll32.EXE Execution of UDL File