<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cortex XDR and windows Install folder in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466208#M1557</link>
    <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;we started to have Cortex XDR alerts for *.tmp files, which refer to the C:\Windows\Install folder.&lt;/P&gt;&lt;P&gt;e.g.&amp;nbsp;&lt;SPAN&gt;C:\Windows\Installer\MSI53B1.tmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Wildfire report says its Malware based probably on the:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Attempted to sleep for a long period | Medium
Malware analysis environments have a limited amount of time in which to execute code and deliver a verdict. To subvert this process, malware often delays execution, or "sleeps," for a long period, allowing it to avoid detection.

Created or modified a file in the Windows system folder | Medium
The Windows system folder contains configuration files and executables that control the underlying functions of the system. Malware often modifies the contents of this folder to manipulate the system, establish persistence, and avoid detection.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interesting thing is that this folder does not exists on any of reported machines, incl. hidden folders.&lt;BR /&gt;Can anyone explain me a little bit more what is the folder \Install for and why we cannot see it?&lt;BR /&gt;Does windows cleans after some patch update / bundle update, but this stays in memmory and Cortex Agent is able to dig it out?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I can report it as an incorrect verdict, but firstly would like to know..&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;BR /&gt;Lukas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Feb 2022 14:48:50 GMT</pubDate>
    <dc:creator>LukasB</dc:creator>
    <dc:date>2022-02-16T14:48:50Z</dc:date>
    <item>
      <title>Cortex XDR and windows Install folder</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466208#M1557</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;we started to have Cortex XDR alerts for *.tmp files, which refer to the C:\Windows\Install folder.&lt;/P&gt;&lt;P&gt;e.g.&amp;nbsp;&lt;SPAN&gt;C:\Windows\Installer\MSI53B1.tmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Wildfire report says its Malware based probably on the:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Attempted to sleep for a long period | Medium
Malware analysis environments have a limited amount of time in which to execute code and deliver a verdict. To subvert this process, malware often delays execution, or "sleeps," for a long period, allowing it to avoid detection.

Created or modified a file in the Windows system folder | Medium
The Windows system folder contains configuration files and executables that control the underlying functions of the system. Malware often modifies the contents of this folder to manipulate the system, establish persistence, and avoid detection.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interesting thing is that this folder does not exists on any of reported machines, incl. hidden folders.&lt;BR /&gt;Can anyone explain me a little bit more what is the folder \Install for and why we cannot see it?&lt;BR /&gt;Does windows cleans after some patch update / bundle update, but this stays in memmory and Cortex Agent is able to dig it out?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I can report it as an incorrect verdict, but firstly would like to know..&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;BR /&gt;Lukas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 14:48:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466208#M1557</guid>
      <dc:creator>LukasB</dc:creator>
      <dc:date>2022-02-16T14:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR and windows Install folder</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466259#M1559</link>
      <description>&lt;P&gt;Hi LukasB,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Typically during an application install, it will create tmp file just like what you see, then after the install, it will clean those temp files that's why its gone. During that time of install execution, XDR will do its checking, thats the reason why you see those alerts.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 16:35:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466259#M1559</guid>
      <dc:creator>jcandelaria</dc:creator>
      <dc:date>2022-02-16T16:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR and windows Install folder</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466454#M1561</link>
      <description>&lt;P&gt;That's exactly what I thought.... what is the best practice? Exclude the folder from malware scan or... ? creating an exception can be potentially dangerous&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 09:00:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466454#M1561</guid>
      <dc:creator>LukasB</dc:creator>
      <dc:date>2022-02-17T09:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR and windows Install folder</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466655#M1562</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/132156"&gt;@LukasB&lt;/a&gt;&amp;nbsp;Mark the incident as Resolved - False Positive since you're aware this is the case. There is no need to exclude any folder from Malware scans as you correctly stated - malicious actors can use temporary directories for staging and short-lived persistence.&lt;BR /&gt;&lt;BR /&gt;Furthermore, XDR Agents will monitor all running processes, raise alerts, perform detection/blocking actions and/or create incidents , whether or not the corresponding files were scanned in disk, and will flag accordingly upon execution.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Feb 2022 02:14:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-and-windows-install-folder/m-p/466655#M1562</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2022-02-18T02:14:41Z</dc:date>
    </item>
  </channel>
</rss>

