Trellix Threat Labs - CB
A recent maldoc contained a novel way of downloading and injecting code using the msdt.exe tool to execute PowerShell and download malicious code #CVE-2022-30190
Processes
The original rule:
Rule {
Process {
Include OBJECT_NAME { -v "WINWORD.exe" }
Include OBJECT_NAME { -v "EXCEL.exe" }
Include OBJECT_NAME { -v "OUTLOOK.exe"}
}
Target {
Match PROCESS {
Include OBJECT_NAME { -v "msdt.exe" }
Include -access "CREATE"
}
}
}
NA
OS: Windows 10 1909 x64 ENS: 10.7.0
Customers are advised to fine-tune the rule in their environment or disable the signature if there are false positives.