Windows MSI installation from web

This rule is part of a beta feature. To learn more, contact Support.

Goal

Detects Windows Installer package installations initiated directly from web URLs, potentially indicating malicious software distribution.

Strategy

This rule monitors Windows MSI Installer events where @evt.id is 1040 from the MsiInstaller provider when @Event.EventData.Data contains URL patterns (://), excluding legitimate Datadog agent installations. Direct MSI installation from web URLs can indicate malicious software distribution where attackers host malicious installer packages on remote servers and trick users into executing them. This technique bypasses traditional file-based detection methods since the malicious code is executed directly from a web resource without being written to disk first.

Triage and response

  • Examine the source URL and determine if it represents a legitimate software vendor or appears to be a suspicious or malicious domain on {{host}}.
  • Review the MSI package contents and installation behavior to identify any malicious components or unwanted software being installed.
  • Check if the installation was initiated by user action or through automated processes that may indicate system compromise.
  • Analyze network logs to understand how the user was directed to the malicious URL, such as through phishing emails or compromised websites.
  • Verify if the installed software created persistence mechanisms, network connections, or other suspicious activities on the system.