← Back to Explore
sigmahighHunting
AppX Located in Known Staging Directory Added to Deployment Pipeline
Detects an appx package that was added to the pipeline of the "to be processed" packages that is located in a known folder often used as a staging directory.
Detection Query
selection_eid:
EventID: 854
selection_paths_forward:
Path|contains:
- :/Perflogs/
- :/Users/Public/
- :/Windows/Temp/
- /AppdData/Local/Temp/
- /Desktop/
- /Downloads/
selection_paths_back:
Path|contains:
- :\PerfLogs\
- :\Users\Public\
- :\Windows\Temp\
- \AppdData\Local\Temp\
- \Desktop\
- \Downloads\
condition: selection_eid and 1 of selection_paths_*
Author
Nasreddine Bencherchali (Nextron Systems)
Created
2023-01-11
Data Sources
windowsappxdeployment-server
Platforms
windows
References
Tags
attack.defense-evasion
Raw Content
title: AppX Located in Known Staging Directory Added to Deployment Pipeline
id: 5cdeaf3d-1489-477c-95ab-c318559fc051
status: test
description: |
Detects an appx package that was added to the pipeline of the "to be processed" packages that is located in a known folder often used as a staging directory.
references:
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
- https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-01-11
tags:
- attack.defense-evasion
logsource:
product: windows
service: appxdeployment-server
detection:
selection_eid:
EventID: 854
selection_paths_forward:
Path|contains: # Paths can be written using forward slash if the "file://" protocol is used
- ':/Perflogs/'
- ':/Users/Public/'
- ':/Windows/Temp/'
- '/AppdData/Local/Temp/'
- '/Desktop/'
- '/Downloads/'
selection_paths_back:
Path|contains: # Paths can be written using forward slash if the "file://" protocol is used
- ':\PerfLogs\'
- ':\Users\Public\'
- ':\Windows\Temp\'
- '\AppdData\Local\Temp\'
- '\Desktop\'
- '\Downloads\'
condition: selection_eid and 1 of selection_paths_*
falsepositives:
- Unknown
level: high