InstallUtil Process Making Network Connections for Defense Evasion
Detection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.
InstallUtil.exe is a legitimate Windows utility used for installing and uninstalling server resources. Adversaries abuse InstallUtil.exe to execute malicious code under the guise of legitimate processes, often to evade detection. This technique allows attackers to proxy execution through a trusted system binary, potentially bypassing application control and security monitoring. The detection rule identifies suspicious network activity by monitoring InstallUtil.exe’s outbound connections, flagging potential misuse by alerting on the initial network connection attempt. This activity is detected via the Elastic EQL rule “InstallUtil Process Making Network Connections.”
Attack Chain
- An attacker gains initial access through an undisclosed method.
- The attacker uses InstallUtil.exe to execute a malicious .NET assembly.
- InstallUtil.exe loads the malicious assembly into its process.
- The malicious assembly executes code that establishes an outbound network connection.
- The connection is used for command and control (C2) or data exfiltration.
- The attacker may use the C2 channel to download and execute further payloads.
- The attacker performs lateral movement within the network.
- The attacker achieves their objective, such as data theft or system compromise.
Impact
Successful exploitation can lead to arbitrary code execution within the context of a trusted Windows process (InstallUtil.exe), bypassing application control and potentially evading detection. This could result in a compromised system, data exfiltration, or further malicious activities within the network. The scope of impact depends on the attacker’s objectives and the level of access gained, potentially affecting entire organizations.
Recommendation
- Enable process creation logging and network connection logging via Sysmon or Elastic Defend to provide the data needed for the rules below.
- Deploy the Sigma rule “InstallUtil Network Connection” to your SIEM and tune for your environment to detect suspicious outbound network connections from InstallUtil.exe.
- Investigate any alerts triggered by the Sigma rule by examining the parent process of InstallUtil.exe, destination IP addresses, and associated activities.
- Implement network monitoring and alerting for unusual outbound connections from critical systems to enhance detection of similar threats in the future.
Detection coverage 2
InstallUtil Network Connection
mediumDetects InstallUtil.exe making outbound network connections, which can indicate malicious activity.
InstallUtil Process Creation
infoDetects InstallUtil.exe process creation, useful for baselining and correlation with network events.
Detection queries are kept inside the platform. Get full rules →