T1218.005 - msxsl / typeperf Execution Response Playbook
Incident response playbook for containing and eradicating LOLBin abuse via msxsl.exe and typeperf.exe, including containment, credential reset, and post-incident detection steps.
Properties
| Property | Value |
|---|---|
| Category | Defense Evasion |
| Response Phase | Contain / Eradicate / Recover |
| Status | Published |
| Related TTPs | T1218.005 |
| Related Queries | Linked Queries |
| Related Tools | typeperf.exe, msxsl.exe |
Steps
- Trigger: Alert on
typeperf.exeormsxsl.exeexecution from non-standard paths. - Triage:
- Retrieve process lineage and hashes.
- Verify
AppData\Roaming\Microsoft\Network\msxsl.exeexistence. - Search for command
typeperf.exe "\System\Processor Queue Length" -si 30 -sc 1.
- Containment:
- Isolate host; preserve volatile memory.
- Block related domains (
eggs-serve[.]corp,more-eggs[.]net).
- Eradication:
- Remove malicious files and persistence.
- Reset user credentials and clear tokens.
- Recovery:
- Reimage host if persistence confirmed.
- Validate clean DNS, process, and service baselines.
- Post-Incident:
- Add detection logic for
msxsl.exeandtypeperf.exeexecution in user context. - Review similar patterns across network for lateral movement.
- Add detection logic for