Windows MSI installation from web

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects Windows Installer package installations initiated directly from web URLs, potentially indicating malicious software distribution.

Strategy

This rule monitors Windows MSI Installer events where @evt.id is 1040 from the MsiInstaller provider when @Event.EventData.Data contains URL patterns (://), excluding legitimate Datadog agent installations. Direct MSI installation from web URLs can indicate malicious software distribution where attackers host malicious installer packages on remote servers and trick users into executing them. This technique bypasses traditional file-based detection methods since the malicious code is executed directly from a web resource without being written to disk first.

Triage and response

  • Examine the source URL and determine if it represents a legitimate software vendor or appears to be a suspicious or malicious domain on {{host}}.
  • Review the MSI package contents and installation behavior to identify any malicious components or unwanted software being installed.
  • Check if the installation was initiated by user action or through automated processes that may indicate system compromise.
  • Analyze network logs to understand how the user was directed to the malicious URL, such as through phishing emails or compromised websites.
  • Verify if the installed software created persistence mechanisms, network connections, or other suspicious activities on the system.