Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 0985cbf

Browse files
authored
Update detect-malcious-use-of-msiexec.md
1 parent 49a5798 commit 0985cbf

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

Execution/detect-malcious-use-of-msiexec.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,24 +11,26 @@ The following query detects activity associated with misuse of msiexec.exe, part
1111
```Kusto
1212
//Find possible download and execution using Msiexec
1313
DeviceProcessEvents
14-
| where Timestamp > ago(30d)
14+
| where Timestamp > ago(7d)
1515
//MSIExec
1616
| where FileName =~ "msiexec.exe" and
1717
//With domain in command line
1818
(ProcessCommandLine has "http" and ProcessCommandLine has "return")//Find PowerShell running files from the temp folder
19+
1920
DeviceProcessEvents
20-
| where Timestamp > ago(30d)
21+
| where Timestamp > ago(7d)
2122
//Looking for PowerShell
2223
| where FileName =~ "powershell.exe"
2324
//Looking for %temp% in the command line indicating deployment
2425
and ProcessCommandLine contains "%temp%"//Find credential theft attempts using Msiexec to run Mimikatz commands
26+
2527
DeviceProcessEvents
26-
| where Timestamp > ago(30d)
28+
| where Timestamp > ago(7d)
2729
| where InitiatingProcessFileName =~ "msiexec.exe"
2830
//Mimikatz commands
2931
and (ProcessCommandLine contains "privilege::"
3032
or ProcessCommandLine has "sekurlsa"
31-
or ProcessCommandLine contains "token::"
33+
or ProcessCommandLine contains "token::")
3234
```
3335

3436
## Category

0 commit comments

Comments
 (0)