DET0328 Detection of Malicious Profile Installation via CMSTP.exe
| Item |
Value |
| ID |
DET0328 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1218.003 (CMSTP)
Analytics
Windows
AN0932
Execution of CMSTP.exe with arguments pointing to suspicious or remote INF/SCT/DLL payloads, optionally followed by outbound network connections to untrusted IPs, process injection via COM interfaces (CMSTPLUA, CMLUAUTIL), registry modifications registering malicious profiles, or creation of suspicious INF/DLL/SCT files prior to execution.
Log Sources
Mutable Elements
| Field |
Description |
| INFPathRegex |
Regex for identifying suspicious INF files; adjust to suppress known safe profiles |
| ExternalIPAllowlist |
Domains or IP ranges allowed for CMSTP network connections |
| COMInterfaceGUIDs |
Set of auto-elevated COM interface GUIDs to flag (e.g., CMSTPLUA, CMLUAUTIL) |
| RegistryKeyAllowlist |
Known good registry entries for CMSTP profile registration |
| TimeWindow |
Correlate CMSTP execution with subsequent network activity or process creation within N seconds |