Query Details

Trusted Installer Abuse Detection

Query

//This query detects attempts to become TrustedInstaller
//Such attempts could allow bypass of ACLs for endpoint tampering
DeviceProcessEvents
| where ProcessCommandLine contains "TrustedInstaller"
| where ProcessCommandLine has_any("config", "sc", "sc.exe", "stop","del","binpath=") 

Explanation

This query is designed to identify any attempts to gain the privileges of "TrustedInstaller" on a device. "TrustedInstaller" is a highly privileged account in Windows, and gaining its privileges could allow someone to bypass security restrictions and tamper with the system.

Here's a simple breakdown of what the query does:

  1. Data Source: It looks at events related to processes on a device (DeviceProcessEvents).

  2. Filter for TrustedInstaller: It checks if the command line of any process contains the term "TrustedInstaller". This indicates that the process might be trying to interact with or impersonate the TrustedInstaller account.

  3. Suspicious Commands: It further filters these processes to see if their command lines include any of the following terms: "config", "sc", "sc.exe", "stop", "del", or "binpath=". These terms are often associated with commands that can change service configurations, stop services, delete files, or alter the execution path of services, which are actions that could be used to manipulate system settings or bypass security controls.

In summary, this query is looking for processes that are potentially trying to exploit the TrustedInstaller account to perform unauthorized actions on a system.

Details

Jay Kerai profile picture

Jay Kerai

Released: November 10, 2024

Tables

DeviceProcessEvents

Keywords

DeviceProcessEventsProcessCommandLineTrustedInstallerConfigScStopDelBinpath

Operators

containshas_any

Actions