<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Remote-Install — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/remote-install/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 29 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/remote-install/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Remote Install via MsiExec</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-msiexec-remote-payload/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-msiexec-remote-payload/</guid><description>This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.</description><content:encoded><![CDATA[<p>Adversaries may abuse Windows Installer (msiexec.exe) to perform remote installations of malicious payloads. This technique is used for initial access, defense evasion, and execution of arbitrary code. The detection rule identifies attempts to install a file from a remote server using MsiExec. The rule looks for msiexec.exe processes running with arguments such as <code>-i</code>, <code>/i</code>, <code>-p</code>, or <code>/p</code>, indicative of remote installations, and executed from suspicious parent processes like <code>sihost.exe</code>, <code>explorer.exe</code>, <code>cmd.exe</code>, <code>wscript.exe</code>, <code>mshta.exe</code>, <code>powershell.exe</code>, <code>wmiprvse.exe</code>, <code>pcalua.exe</code>, <code>forfiles.exe</code>, and <code>conhost.exe</code>. The rule includes exceptions to reduce false positives from legitimate software installations, specifically excluding command lines containing <code>--set-server</code>, <code>UPGRADEADD</code>, <code>--url</code>, <code>USESERVERCONFIG</code>, <code>RCTENTERPRISESERVER</code>, <code>app.ninjarmm.com</code>, <code>zoom.us/client</code>, <code>SUPPORTSERVERSTSURI</code>, <code>START_URL</code>, <code>AUTOCONFIG</code>, <code>awscli.amazonaws.com</code>, <code>*/i \&quot;C:*</code>, and <code>*/i C:\\*</code>. This technique can lead to complete system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via an unspecified method (e.g., phishing, exploit).</li>
<li>The attacker uses a script or command-line interpreter (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) to initiate the <code>msiexec.exe</code> process.</li>
<li>The <code>msiexec.exe</code> process is launched with arguments that specify a remote MSI package (<code>-i</code>, <code>/i</code>, <code>-p</code>, <code>/p</code>) and enable silent installation (<code>/qn</code>, <code>-qn</code>, <code>-q</code>, <code>/q</code>, <code>/quiet</code>).</li>
<li>The <code>msiexec.exe</code> process downloads the MSI package from a remote server over HTTP or HTTPS.</li>
<li><code>msiexec.exe</code> executes the downloaded MSI package, which may contain malicious payloads.</li>
<li>The malicious payload executes, potentially performing actions such as installing malware, establishing persistence, or escalating privileges.</li>
<li>The attacker gains control over the compromised system.</li>
<li>The attacker performs further actions, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive data, or disrupt system operations. A compromised system can be used as a pivot point to access other systems on the network. The impact can range from data breaches and financial losses to reputational damage and disruption of critical services. The number of potential victims depends on the scope of the initial access and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious MsiExec invocations with remote payloads.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the required data is available for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process, command-line arguments, and network connections associated with the <code>msiexec.exe</code> process.</li>
<li>Monitor process execution events for child processes spawned by <code>msiexec.exe</code> for anomalous activity.</li>
<li>Implement application control policies to restrict the execution of <code>msiexec.exe</code> to authorized users and processes only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>msiexec</category><category>remote-install</category></item></channel></rss>