Query Details
//This query detects attempts to become TrustedInstaller
//Such attempts could allow bypass of ACLs for endpoint tampering
DeviceProcessEvents
| where ProcessCommandLine contains "TrustedInstaller"
| where ProcessCommandLine has_any("config", "sc", "sc.exe", "stop","del","binpath=") This query is designed to identify any attempts to gain the privileges of "TrustedInstaller" on a device. "TrustedInstaller" is a highly privileged account in Windows, and gaining its privileges could allow someone to bypass security restrictions and tamper with the system.
Here's a simple breakdown of what the query does:
Data Source: It looks at events related to processes on a device (DeviceProcessEvents).
Filter for TrustedInstaller: It checks if the command line of any process contains the term "TrustedInstaller". This indicates that the process might be trying to interact with or impersonate the TrustedInstaller account.
Suspicious Commands: It further filters these processes to see if their command lines include any of the following terms: "config", "sc", "sc.exe", "stop", "del", or "binpath=". These terms are often associated with commands that can change service configurations, stop services, delete files, or alter the execution path of services, which are actions that could be used to manipulate system settings or bypass security controls.
In summary, this query is looking for processes that are potentially trying to exploit the TrustedInstaller account to perform unauthorized actions on a system.

Jay Kerai
Released: November 10, 2024
Tables
Keywords
Operators