<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Cortex XDR PoC: Software Installations Blocking in Cortex XDR Articles</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/ta-p/523556</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this proof of concept (PoC), we'll take a look at using &lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr/ct-p/Cortex_XDR" target="_self"&gt;Cortex XDR&lt;/A&gt; to block software installations in a test environment. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This PoC focuses on blocking files that use the .msi and .exe file extensions. These file types are widely used for common software installations and should serve to cover a broad base of applications. For testing, four executable files will be installed: Two .msi and two .exe files. From there, we’ll try to find anything we can use to block the installations. We're also going to focus on BIOC’s and prevent the execution of these files and their associated processes.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;Please note: These processes were tested in a lab environment. Any attempt to reproduce the process described in this article may have various results.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 class="lia-message-template-content-zone"&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Cortex XDR PoC: Software Installations Blocking Prerequisites&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;For this PoC the following will be required in your environment:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Windows Endpoints&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Cortex XDR Pro per Endpoint&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Files Used:&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Google Chrome - ChromeSetup.exe&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;VLC Media Player - vlc-3.0.17.4-win64&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Firefox Browser - Firefox Setup 14.0.1.msi&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Zoom - ZoomInstallerFull.msi&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;What is a Software Installation?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#333300"&gt;Installation typically involves code (program) being copied/generated from the installation files to new files on the local computer. It provides easier access via the operating system — creating necessary directories, registering environment variables, providing separate programs for un-installation, etc.&lt;/FONT&gt; Because code is generally copied/generated in multiple locations, uninstallation often involves more than just erasing the program folder. For example, registry files and other system code may need to be modified or deleted for a complete uninstallation.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN&gt;Installation Files&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;The most common types of installation files are .msi and .exe. These will be the focus of this PoC. Other types of installation files exist such as .bat, .com, .cmd, .inf and .run, but for this PoC we’re only going to focus on .msi and .exe as they’re the more prevalent types of installation files available.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;What is an EXE file?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;The .exe extension may be one of the most easily recognizable file formats in existence. An executable file (EXE file) is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon. Executable files commonly have an EXE file extension, but there are hundreds of other executable file formats.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With Windows, EXE is the file extension for an executable file. All EXE files are executable files, but not all executable files are EXE files.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Executable files with the .exe extension also come in different types such as portable executables.&amp;nbsp; For this PoC we’re going to focus on installation files and not any of the other types.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Below is an image of the contents of the VLC Media Player install file with its contents extracted using the 7 zip utility.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_14-1670437404874.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45967i01967CA6B4FBC77E/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_14-1670437404874.png" alt="rtsedaka_14-1670437404874.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;What is an MSI file?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;An MSI file is a Windows package that contains installation information for a particular installer, including files to be installed and installation locations. It may be used for Windows updates or third-party software installers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Windows uses the Windows Installer program to open MSI files. This program was previously named the Microsoft Installer, which is what gave MSI files their name.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Below is an image of using the 7 zip utility to extract the files inside of Firefox Setup 14.0.1.msi.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_15-1670437404938.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45968iD36D399EB1EBE201/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_15-1670437404938.png" alt="rtsedaka_15-1670437404938.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H4&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;MSI vs. EXE files&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Developers may save Windows application installers as .MSI files instead of EXE files. MSI files are similar to EXE files, except they always contain application installers. They never contain Windows applications or other programs. Windows always uses Windows Installer (a utility included with Windows) to open MSI files and install the program they contain.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;EXE Software Installations in Cortex XDR&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Chrome and VLC Media Player are now going to be installed on the test machines.&amp;nbsp; Once that’s completed we can investigate the causality chain and see if there are any interesting characteristics that we can hone in on.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Below are the Causality chains for the install of our two installation files for Google Chrome and VLC Media Player respectively.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_0-1672679859977.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46588iC10EE880C16927F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_0-1672679859977.png" alt="rtsedaka_0-1672679859977.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;Causality chain for Google Chrome installation&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_17-1670437404810.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45971i475382CD1722BFE7/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_17-1670437404810.png" alt="rtsedaka_17-1670437404810.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN&gt;Causality chain for VLC Media Player installation&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;At first glance nothing seems to pop out.&amp;nbsp; After going through things like file actions, registry modifications and processes there don’t appear to be any similarities.&amp;nbsp; We did see something interesting in the target_process_cmd for chrome set up, though:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_18-1670437404876.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45970i6FF93CC74ACC3257/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_18-1670437404876.png" alt="rtsedaka_18-1670437404876.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;Use of a /install flag&lt;BR /&gt;&lt;BR /&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN&gt;The use of the /install flag is not something that has been seen in all software installations, but it may be something we can use later.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;MSI Software Installations in Cortex XDR&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The aforementioned .msi files have now been installed on our test host. Now we’ll take a look at the installations of all files and see if we can discern any useful information about them that will help us block the installation of these files on another test machine.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let’s begin by first looking at our .msi files. We’re going to do a simple query to pull up all the data on our endpoint over the previous 24 hours.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;By navigating to Incident Response -&amp;gt; Query Builder we can select ‘Process’.&amp;nbsp; From there we’re going to type in the name of the test machine and run the search.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H6&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_19-1670437405004.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45972iB7A8DF01BDE66437/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_19-1670437405004.png" alt="rtsedaka_19-1670437405004.png" /&gt;&lt;/span&gt;Select Process after selecting query builder&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H6&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_20-1670437404873.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45976iA5E3A55DA2A090AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_20-1670437404873.png" alt="rtsedaka_20-1670437404873.png" /&gt;&lt;/span&gt;Querying the test machine's host name&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once the search is run we can filter through the results by narrowing down on ‘target_process_cmd’ and selecting any entry that contains .msi as seen below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_21-1670437405005.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45974i09101BF88F705032/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_21-1670437405005.png" alt="rtsedaka_21-1670437405005.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN&gt;Query results for msi files&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The images below represent the causality chain for the install of our two MSI files.&amp;nbsp; Looking at these two images we can quickly see a similarity.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_22-1670437404993.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45973i04F42F42B05974A6/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_22-1670437404993.png" alt="rtsedaka_22-1670437404993.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;Causality&lt;SPAN&gt;&amp;nbsp;chain for zoom msi installer&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_23-1670437405002.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45979i3D76385EBC0FD757/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_23-1670437405002.png" alt="rtsedaka_23-1670437405002.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;Causality&lt;SPAN&gt;&amp;nbsp;chain for Firefox msi installer&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The command that executed the install for these files uses a file called msiexec.exe with a flag and then the location of our installation files.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_24-1670437404953.png" style="width: 568px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45977i46C8BAFA66692CF6/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_24-1670437404953.png" alt="rtsedaka_24-1670437404953.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_25-1670437404931.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45978i9957E4B96238085B/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_25-1670437404931.png" alt="rtsedaka_25-1670437404931.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H3&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;What is msiexec.exe?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The genuine msiexec.exe file is a software component of Microsoft Windows by Microsoft.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Microsoft Windows is an operating system. Windows Installer is an application programming and software component of Microsoft Windows. Msiexec.exe is part of the Windows Installer utility and is used to install MSI and MSP packages, and is completely safe for your PC.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In our install example we saw the /i flag being used which is the flag for a normal installation.&amp;nbsp; Below is a table that describes the syntax for msiexec.exe&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_26-1670437404936.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45981iAEB1E5A1BD4A249E/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_26-1670437404936.png" alt="rtsedaka_26-1670437404936.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Blocking .exe Installation Using Cortex XDR&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When it came to our .exe installations, we didn’t see any similarity between the two files we chose for this PoC.&amp;nbsp; In actuality, several different applications were installed into our test machine and, after analyzing the data, I’ve concluded that while some installations can be blocked there is no one-size fits all for this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;While looking at the installation for Google Chrome we did notice the use of a flag /install.&amp;nbsp; This could be used to stop the installation of Google Chrome.&amp;nbsp; By creating BIOC, focusing on process execution and setting CMD =~ install.&amp;nbsp; This BIOC will stop the install of Google Chrome and an installer that uses the same flag.&amp;nbsp; Again, in our testing Google Chrome was the only application that used the flag on install.&amp;nbsp; This will work for our specific application, but be warned it may have the undesired consequences in your environment.&amp;nbsp; Testing in a non production environment should be used before trying to apply a rule like this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Another avenue which could be used is a BIOC that would block the execution of any files that have the .exe extension.&amp;nbsp; However, during testing this proved to be troublesome.&amp;nbsp; Windows relies on a lot of files in the background that run without the user ever seeing them.&amp;nbsp; Some of these are crucial to basic windows functionality.&amp;nbsp; Blocking the execution of any .exe program will undoubtedly cause unexpected issues as it did during testing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There’s also the use of CMD.&amp;nbsp; For the install of all of the software during this testing we’ve been relying on what commands were used in CMD.&amp;nbsp; What if we just blocked the execution of cmd.exe?&amp;nbsp; Well, that also has some very unexpected consequences.&amp;nbsp; While it does block software installations, it now allows the use of any CMD commands, and also prevents any internet browsing and opening of most programs.&amp;nbsp; This is because CMD is crucial to the Windows operating system.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When dealing with known software to block an IOC, a rule can always be used instead by using the full name, file path or hash value.&amp;nbsp; For this PoC the goal is to stop the installation and not just remove the file.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Blocking .msi Installations Using Cortex XDR&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When it comes to .msi installations we did find some interesting similarities in their execution.&amp;nbsp; We discovered the file msiexec.exe.&amp;nbsp; Creating a BIOC to block the execution of this file should result in blocking any attempts to install applications using the .msi extension.&amp;nbsp; We’ll navigate to Detection Rules -&amp;gt; BIOC and select ‘process’.&amp;nbsp; Once there we’ll type ‘msiexec.exe’ into the name filed under process and create the BIOC.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_27-1670437404954.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45982i4D4AC9AAD1907CE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_27-1670437404954.png" alt="rtsedaka_27-1670437404954.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN&gt;Using query builder to search for msiexec.exe&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_28-1670437405074.png" style="width: 469px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45980i2F69663008C4B2CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_28-1670437405074.png" alt="rtsedaka_28-1670437405074.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN&gt;Creating BIOC from previous query&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN&gt;Now the rule will be added to our prevention profile and applied to our test machine.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;EM&gt;&lt;STRONG&gt;SUCCESS!&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_29-1670437405242.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45984i82C2B90B4ED55986/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_29-1670437405242.png" alt="rtsedaka_29-1670437405242.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;After applying the rule to the test machine and attempting to install an application using the .msi extension, it was blocked.&amp;nbsp; Below we can see an image of the alert generated by msiexe.exe. This was tested several times and all resulted in success.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This is because the software installations require the use of msiexec.exe.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rtsedaka_30-1670437405442.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/45983i12F073D58C2445A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="rtsedaka_30-1670437405442.png" alt="rtsedaka_30-1670437405442.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN&gt;Alert generated from msiexec.exe BIOC rule&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Cortex XDR PoC: Software Installations Blocking Conclusion&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this PoC we demonstrated how Cortex XDR can be used to block software installations. We were successfully able to block .msi installations and had mixed results with .exe installations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;While Cortex XDR can be used to block software installations, there are better ways to achieve this; a great use case for this would be an air-gapped portion of your network that was only used to perform certain specific functions. For production environments I would recommend using Group Policy Objects (GPOs), as they would allow administrators to block all software installations by disallowing users to do things like make registry changes based on user groups. GPOs could be used to block the executions of executable files, but wouldn’t be a recommended use case for Cortex XDR. Based on the testing shown in this PoC Cortex XDR could be used to block .msi based installations. Again, I would caution any user to conduct testing in their own environment before trying this in a production environment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Cortex XDR PoC: Software Installations Blocking References:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://fileinfo.com/extension/msi" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;FileInfo.com: MSI File Extension&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/investigation-and-response/cortex-xdr-indicators/working-with-biocs/create-a-bioc-rule" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Cortex Help Center: Create an IOC Rule&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Create-a-BIOC-Rule" target="_blank" rel="noopener"&gt;Cortex Help Center: Create an BIOC Rule&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Feb 2023 21:06:49 GMT</pubDate>
    <dc:creator>rtsedaka</dc:creator>
    <dc:date>2023-02-15T21:06:49Z</dc:date>
    <item>
      <title>Cortex XDR PoC: Software Installations Blocking</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/ta-p/523556</link>
      <description>&lt;P&gt;Let's walkthrough a PoC of&amp;nbsp;&lt;SPAN&gt;using Cortex XDR to block software installations —.msi and .exe file extensions — in a test environment.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2023 21:06:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/ta-p/523556</guid>
      <dc:creator>rtsedaka</dc:creator>
      <dc:date>2023-02-15T21:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR PoC: Software Installations Blocking</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/tac-p/525644#M25</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;Great post, thanks&amp;nbsp;Rtsedaka&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Any related post on MacOS?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 07:40:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/tac-p/525644#M25</guid>
      <dc:creator>mcheung</dc:creator>
      <dc:date>2023-01-03T07:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR PoC: Software Installations Blocking</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/tac-p/526355#M28</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/201140"&gt;@mcheung&lt;/a&gt;,&amp;nbsp;I don't believe there are any posts similar to this related to MacOS.&amp;nbsp; This article details windows as it's a more widely used operating system.&amp;nbsp; I believe the same concepts can be applied to MacOS devices.&amp;nbsp; I would strongly encourage trying this in a lab environment first.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 16:32:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/tac-p/526355#M28</guid>
      <dc:creator>anlynch</dc:creator>
      <dc:date>2023-01-09T16:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR PoC: Software Installations Blocking</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/tac-p/530181#M30</link>
      <description>&lt;P&gt;I have been looking into this extensively for executable (.exe) installations, I have a solution, but this will probably not be a "one size fits all". The following BIOC presumes the following:&lt;/P&gt;&lt;P&gt;1. "Normal" users only have write access to 'Downloads', 'Documents' and 'Desktop'&lt;/P&gt;&lt;P&gt;2. There is a requirement for privileged users (Administrator accounts) to install .exe based applications&lt;/P&gt;&lt;P&gt;3. the users 'Downloads' and ''Documents' directories are not always on the Root (C:) drive.&lt;BR /&gt;&lt;BR /&gt;Here is the BIOC that can be added to a restriction Profile.&lt;BR /&gt;dataset = xdr_data&lt;BR /&gt;| filter event_type = ENUM.PROCESS&lt;BR /&gt;// If you use "Tier" accounts, these could be added here.&lt;BR /&gt;and action_process_username !~= "^.+[sS][yY][sS][tT][eE][mM]$|^.+[aA][dD][mM][iI][nN][iI][sS][tT][rR][aA][tT][oO][rR]$"&amp;nbsp;&lt;BR /&gt;and action_process_image_path ~="^[a-zA-Z]:\\[uU][sS][eE][rR][sS]\\*.*\\[dD]ownloads\\*.*\\+.*[eE][xX][eE]$|^[a-zA-Z]:\\[uU][sS][eE][rR][sS]\\*.*\\[dD]ocuments\\*.*\\+.*[eE][xX][eE]$|^[a-zA-Z]:\\[uU][sS][eE][rR][sS]\\*.*\\[dD]esktop\\*.*\\+.*[eE][xX][eE]$"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you use "Tier" accounts, these could be added to the regex for 'action_process_username' exception&lt;/P&gt;&lt;P&gt;Feedback and or suggestions are welcom,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Phil&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 20:03:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-articles/cortex-xdr-poc-software-installations-blocking/tac-p/530181#M30</guid>
      <dc:creator>PhilBenson</dc:creator>
      <dc:date>2023-02-07T20:03:21Z</dc:date>
    </item>
  </channel>
</rss>

