<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Remote-Download — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/remote-download/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/remote-download/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious MSIExec Remote Download</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-msiexec-remote-download/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-msiexec-remote-download/</guid><description>The analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.</description><content:encoded><![CDATA[<p>The detection focuses on identifying instances where <code>msiexec.exe</code> is used with an HTTP or HTTPS URL in the command line. This behavior is indicative of an attempt to download and execute potentially malicious software from a remote server. The detection leverages data from Endpoint Detection and Response (EDR) agents, focusing on process execution logs that include command-line details. This activity is significant as it may indicate an attempt to download and execute potentially malicious software from a remote server. If confirmed malicious, this could lead to unauthorized code execution, system compromise, or further malware deployment within the network. The activity is often used to bypass traditional security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through various means, such as phishing or exploiting a software vulnerability.</li>
<li>The attacker leverages <code>msiexec.exe</code>, a legitimate Windows utility, to download a malicious MSI package from a remote HTTP or HTTPS server.</li>
<li>The command line includes a URL pointing to a malicious MSI file hosted on a compromised or attacker-controlled server.</li>
<li><code>msiexec.exe</code> downloads the MSI package to the victim&rsquo;s machine.</li>
<li>The MSI package is executed, potentially installing malware, creating new files, or modifying system settings.</li>
<li>The installed malware establishes persistence through registry keys or scheduled tasks.</li>
<li>The malware initiates command and control (C2) communication to receive further instructions.</li>
<li>The attacker performs actions on the objective such as data exfiltration or lateral movement within the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized code execution, system compromise, or further malware deployment within the network. The use of <code>msiexec.exe</code> for remote downloads can bypass traditional security controls, allowing attackers to deliver and execute malicious payloads undetected. The dfirreport.com article references data exfiltration following exploitation via MSIExec.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to activate the rules below, capturing command-line details (Sysmon EventID 1).</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor network traffic for connections originating from <code>msiexec.exe</code> to external HTTP/HTTPS URLs (Network Visibility Module Flow Data).</li>
<li>Investigate any instances of <code>msiexec.exe</code> executing with command-line arguments containing HTTP or HTTPS URLs.</li>
<li>Filter false positives by destination or parent process as needed based on your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>endpoint</category><category>msiexec</category><category>remote-download</category><category>windows</category></item></channel></rss>