Detection rules › Sigma

Setup16.EXE Execution With Custom .Lst File

Severity
medium
Author
frack113
Source
upstream

Detects the execution of "Setup16.EXE" and old installation utility with a custom ".lst" file. These ".lst" file can contain references to external program that "Setup16.EXE" will execute. Attackers and adversaries might leverage this as a living of the land utility.

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1574.005 Hijack Execution Flow: Executable Installer File Permissions Weakness
Privilege EscalationT1574.005 Hijack Execution Flow: Executable Installer File Permissions Weakness
Defense EvasionT1574.005 Hijack Execution Flow: Executable Installer File Permissions Weakness

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: selection

ParentCommandLine|contains: ' -m '
ParentImage: 'C:\Windows\SysWOW64\setup16.exe'

Stage 2: not 1 of filter_optional_valid_path

Image|startswith: 'C:\~MSSETUP.T\'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Imagestarts_with
  • C:\~MSSETUP.T\
ParentCommandLinematch
  • -m
ParentImageeq
  • C:\Windows\SysWOW64\setup16.exe