Signed Binary Proxy Execution: Msiexec

Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi).[1] Msiexec.exe is digitally signed by Microsoft.

Adversaries may abuse msiexec.exe to launch local or network accessible MSI files. Msiexec.exe can also execute DLLs.[2][3] Since it is signed and native on Windows systems, msiexec.exe can be used to bypass application control solutions that do not account for its potential abuse. Msiexec.exe execution may also be elevated to SYSTEM privileges if the AlwaysInstallElevated policy is enabled.[4]

ID: T1218.007
Sub-technique of:  T1218
Tactic: Defense Evasion
Platforms: Windows
Permissions Required: User
Defense Bypassed: Application control, Digital Certificate Validation
Contributors: Alexandros Pappas; Ziv Kaspersky, Cymptom
Version: 1.1
Created: 24 January 2020
Last Modified: 07 June 2021

Procedure Examples

ID Name Description
S0584 AppleJeus

AppleJeus has been installed via MSI installer.[5]

S0631 Chaes

Chaes has used .MSI files as an initial way to start the infection chain.[6]

S0611 Clop

Clop can use msiexec.exe to disable security tools on the system.[7]

S0038 Duqu

Duqu has used msiexec to execute malicious Windows Installer packages. Additionally, a PROPERTY=VALUE pair containing a 56-bit encryption key has been used to decrypt the main payload from the installer packages.[8]

S0531 Grandoreiro

Grandoreiro can use MSI files to execute DLLs.[9]

S0483 IcedID

IcedID can inject itself into a suspended msiexec.exe process to send beacons to C2 while appearing as a normal msi application. [10]

S0528 Javali

Javali has used the MSI installer to download and execute malicious payloads.[9]

S0451 LoudMiner

LoudMiner used an MSI installer to install the virtualization software.[11]

G0095 Machete

Machete has used msiexec to install the Machete malware.[12]

S0449 Maze

Maze has delivered components for its ransomware attacks using MSI files, some of which have been executed from the command-line using msiexec.[13]

S0530 Melcoz

Melcoz can use MSI files with embedded VBScript for execution.[9]

S0455 Metamorfo

Metamorfo has used MsiExec.exe to automatically execute files.[14][15]

G0021 Molerats

Molerats has used msiexec.exe to execute an MSI payload.[16]

S0650 QakBot

QakBot can use MSIExec to spawn multiple cmd.exe processes.[17]

S0481 Ragnar Locker

Ragnar Locker has been delivered as an unsigned MSI package that was executed with msiexec.exe.[18]

G0075 Rancor

Rancor has used msiexec to download and execute malicious installer files over HTTP.[19]

S0592 RemoteUtilities

RemoteUtilities can use Msiexec to install a service.[20]

G0092 TA505

TA505 has used msiexec to download and execute malicious Windows Installer files.[21][22][23]


ZIRCONIUM has used the msiexec.exe command-line utility to download and execute malicious MSI files.[24]


ID Mitigation Description
M1042 Disable or Remove Feature or Program

Consider disabling the AlwaysInstallElevated policy to prevent elevated execution of Windows Installer packages.[4]

M1026 Privileged Account Management

Restrict execution of Msiexec.exe to privileged accounts or groups that need to use it to lessen the opportunities for malicious usage.


ID Data Source Data Component
DS0017 Command Command Execution
DS0011 Module Module Load
DS0029 Network Traffic Network Connection Creation
DS0009 Process Process Creation

Use process monitoring to monitor the execution and arguments of msiexec.exe. Compare recent invocations of msiexec.exe with prior history of known good arguments and executed MSI files or DLLs to determine anomalous and potentially adversarial activity. Command arguments used before and after the invocation of msiexec.exe may also be useful in determining the origin and purpose of the MSI files or DLLs being executed.


  1. Brandt, A., Mackenzie, P.. (2020, September 17). Maze Attackers Adopt Ragnar Locker Virtual Machine Technique. Retrieved October 9, 2020.
  2. Zhang, X. (2020, February 4). Another Metamorfo Variant Targeting Customers of Financial Institutions in More Countries. Retrieved July 30, 2020.
  3. ESET Research. (2019, October 3). Casbaneiro: peculiarities of this banking Trojan that affects Brazil and Mexico. Retrieved September 23, 2021.
  4. Falcone, R., et al. (2020, March 3). Molerats Delivers Spark Backdoor to Government and Telecommunications Organizations. Retrieved December 14, 2020.
  5. CS. (2020, October 7). Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2. Retrieved September 27, 2021.
  6. SophosLabs. (2020, May 21). Ragnar Locker ransomware deploys virtual machine to dodge security. Retrieved June 29, 2020.
  7. Ash, B., et al. (2018, June 26). RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families. Retrieved July 2, 2018.
  8. Peretz, A. and Theck, E. (2021, March 5). Earth Vetala – MuddyWater Continues to Target Organizations in the Middle East. Retrieved March 18, 2021.
  9. Salem, E. (2019, April 25). Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware. Retrieved May 28, 2019.
  10. Vilkomir-Preisman, S. (2019, April 2). New ServHelper Variant Employs Excel 4.0 Macro to Drop Signed Payload. Retrieved May 28, 2019.
  11. Hiroaki, H. and Lu, L. (2019, June 12). Shifting Tactics: Breaking Down TA505 Group’s Use of HTML, RATs and Other Techniques in Latest Campaigns. Retrieved May 29, 2020.
  12. Singh, S. and Antil, S. (2020, October 27). APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services. Retrieved March 24, 2021.