<<< Hide Navigation Hide TOC >>>
Always Install Elevated MSI Spawned Cmd And Powershell (1e53dd56-8d83-4eb4-a43e-b790a05510aa)
Detects Windows Installer service (msiexec.exe) spawning "cmd" or "powershell"
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Always Install Elevated MSI Spawned Cmd And Powershell (1e53dd56-8d83-4eb4-a43e-b790a05510aa) | Sigma-Rules | Bypass User Account Control - T1548.002 (120d5519-3098-4e1c-9191-2aa61232f073) | Attack Pattern | 1 |
Abuse Elevation Control Mechanism - T1548 (67720091-eee3-4d2d-ae16-8264567f6f5b) | Attack Pattern | Bypass User Account Control - T1548.002 (120d5519-3098-4e1c-9191-2aa61232f073) | Attack Pattern | 2 |