TA0005 Potentially Suspicious Windows App Activity
TA0005 - Potentially Suspicious Windows App Activity¶
DESCRIPTION¶
Detects potentially suspicious child process of applications launched from inside the WindowsApps directory. This could be a sign of a rogue ".appx" package installation/execution
Example:
"c:\Program Files\WindowsApps\
\UpdateFix\SecurityFix.exe" spawning
"c:\Windows\System32\cmd.exe" /C regsvr32 /s "C:\Users\XXX\AppData\Local\Temp\4h23123qwe.dll"
Related
BazarBackdoor BazarLoader
Reference
https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques
https://github.com/SigmaHQ/sigma/blob/6b8cd1f0f1d222dcffa95394b4cbcec2a05137a0/rules/windows/process_creation/proc_creation_win_susp_appx_execution.yml#L6
ATT&CK TACTICS¶
T1059 -
Command and Scripting Interpreter
T1218.005 -
System Binary Proxy Execution:
Mshta
T1047 -
Windows Management Instrumentation
Data Source(s): Command, Process
SENTINEL RULE QUERY¶
Triage¶
- Verify ProcessCommandLine field for any suspicious activities spawned by WindowsApps.
- Determine whether the Windows Apps was known to the environment and approved.
False Positive¶
- Legitimate Windows App running
Version¶
Version 1.0 (date 19/3/2024)