Skip to content

<<< Hide Navigation Hide TOC >>>

Always Install Elevated MSI Spawned Cmd And Powershell (1e53dd56-8d83-4eb4-a43e-b790a05510aa)

Detects Windows Installer service (msiexec.exe) spawning "cmd" or "powershell"

Galaxy ColorsSigma-Rule...Attack Pat...
Rows: 2
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
Always Install Elevated MSI Spawned Cmd And Powershell (1e53dd56-8d83-4eb4-a43e-b790a05510aa) Sigma-Rules Bypass User Account Control - T1548.002 (120d5519-3098-4e1c-9191-2aa61232f073) Attack Pattern 1
Abuse Elevation Control Mechanism - T1548 (67720091-eee3-4d2d-ae16-8264567f6f5b) Attack Pattern Bypass User Account Control - T1548.002 (120d5519-3098-4e1c-9191-2aa61232f073) Attack Pattern 2