ms-msdt for RCE CVE-2022-30190

Detecting the execution of weaponized maldoc or embedded link in outlook that uses ms-msdt scheme to execute code.

Sigma rule (View on GitHub)

 1title: ms-msdt for RCE CVE-2022-30190
 2id: 5eff5816-a518-4ab8-b7e0-a776344e7d36
 3description: Detecting the execution of weaponized maldoc or embedded link in outlook that uses ms-msdt scheme to execute code.
 4status: experimental
 5references:
 6  - https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
 7  - https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30190
 8  - https://twitter.com/nao_sec/status/1530196847679401984
 9  - https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
10  - https://twitter.com/secforce_ltd/status/1531987722293886978?s=21&t=f6-tesTzFEhR7TSoyTtp8Q
11author: '@Kostastsale'
12date: 2022/05/29
13logsource:
14    category: process_creation
15    product: windows
16detection:
17    selection1:
18        Image|endswith:
19          - '\msdt.exe'
20        CommandLine|contains|all:
21          - 'msdt'
22          - '/id'
23    selection2:
24        CommandLine|contains|all:
25          - 'IT_BrowseForFile'
26          - 'IT_LaunchMethod'
27    selection3:
28        CommandLine|contains|all:
29          - '/af'
30          - '.xml'
31    condition: selection1 and (selection2 or selection3)
32falsepositives:
33    - Uknown
34level: high
35tags:
36    - attack.execution
37    - attack.T1059.003
38    - attack.T1204.002```

References

Related rules

to-top