1
1
name : Windows InstallUtil Remote Network Connection
2
2
id : 4fbf9270-43da-11ec-9486-acde48001122
3
- version : 10
4
- date : ' 2025-02-10 '
3
+ version : 11
4
+ date : ' 2025-02-22 '
5
5
author : Michael Haag, Splunk
6
6
status : production
7
7
type : TTP
@@ -16,15 +16,24 @@ description: The following analytic detects the Windows InstallUtil.exe binary m
16
16
of this activity.
17
17
data_source :
18
18
- Sysmon EventID 1 AND Sysmon EventID 3
19
- search : ' | tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
20
- where `process_installutil` by _time span=1h Processes.process_id Processes.process_name
21
- Processes.dest Processes.user Processes.process_path Processes.process Processes.parent_process_name
22
- Processes.original_file_name | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
23
- | `security_content_ctime(lastTime)` | join process_id [| tstats `security_content_summariesonly`
24
- count FROM datamodel=Network_Traffic.All_Traffic where All_Traffic.dest_port !=
25
- 0 by All_Traffic.process_id All_Traffic.dest All_Traffic.dest_port | `drop_dm_object_name(All_Traffic)`
26
- | rename dest as C2 ] | table _time user dest parent_process_name process_name process_path
27
- process process_id dest_port C2 | `windows_installutil_remote_network_connection_filter`'
19
+ search : |-
20
+ | tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
21
+ where `process_installutil` by _time span=1h Processes.process_id Processes.process_name
22
+ Processes.dest Processes.user Processes.process_path Processes.process Processes.parent_process_name
23
+ Processes.original_file_name
24
+ | `drop_dm_object_name(Processes)`
25
+ | `security_content_ctime(firstTime)`
26
+ | `security_content_ctime(lastTime)`
27
+ | join process_id
28
+ [| tstats `security_content_summariesonly`
29
+ count FROM datamodel=Network_Traffic.All_Traffic where All_Traffic.dest_port !=
30
+ 0 by All_Traffic.process_id All_Traffic.dest All_Traffic.dest_port
31
+ | `drop_dm_object_name(All_Traffic)`
32
+ | rename dest as C2 ]
33
+ | table _time user dest parent_process_name process_name process_path process process_id dest_port C2
34
+ | stats count min(_time) as firstTime max(_time) as lastTime values(process) as process values(C2) as command_and_control by user dest process_name process_id dest_port parent_process_name
35
+ | `security_content_ctime(firstTime)`
36
+ | `security_content_ctime(lastTime)`| `windows_installutil_remote_network_connection_filter`
28
37
how_to_implement : The detection is based on data that originates from Endpoint Detection
29
38
and Response (EDR) agents. These agents are designed to provide security-related
30
39
telemetry from the endpoints where the agent is installed. To implement this search,
@@ -55,7 +64,7 @@ drilldown_searches:
55
64
latest_offset : $info_max_time$
56
65
rba :
57
66
message : An instance of $parent_process_name$ spawning $process_name$ was identified
58
- on endpoint $dest$ generating a remote download.
67
+ on endpoint $dest$ generating a remote download from $
59
68
risk_objects :
60
69
- field : user
61
70
type : user
0 commit comments