← Back to SOC feed Coverage →

detect-office-applications-spawning-msdt-CVE-2022-30190

kql MEDIUM Azure-Sentinel
T1221
DeviceProcessEvents
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-20T23:00:01Z · Confidence: medium

Hunt Hypothesis

Adversaries may exploit the ms-msdt URI scheme to execute malicious code via the Microsoft Support Diagnostic Tool vulnerability, leveraging T1221 to bypass standard security controls. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential exploitation of CVE-2022-30190 before it leads to persistent malware execution.

KQL Query

// Office products spawning MSDT
DeviceProcessEvents
| where InitiatingProcessFileName in~ ("winword.exe", "excel.exe", "outlook.exe", "powerpnt.exe")
and FileName =~"msdt.exe"

Analytic Rule Definition

id: cd1c9815-1f2c-483e-a875-b81bfcc1489b
name: detect-office-applications-spawning-msdt-CVE-2022-30190
description: |
  This query detects possible abuse of ms-msdt MSProtocol URI scheme to load and execute malicious code via Microsoft Support Diagnostic Tool Vulnerability (CVE-2022-30190).
  The following query detects when Microsoft Office software spawns an instance of the MSDT utility, msdt.exe.
  References:
  https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190
  https://msrc-blog.microsoft.com/2022/05/30/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability/
  https://www.huntress.com/blog/microsoft-office-remote-code-execution-follina-msdt-bug
  https://attack.mitre.org/techniques/T1221/
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
tactics:
- Defense Evasion
relevantTechniques:
  - T1221
query: |
  // Office products spawning MSDT
  DeviceProcessEvents
  | where InitiatingProcessFileName in~ ("winword.exe", "excel.exe", "outlook.exe", "powerpnt.exe")
  and FileName =~"msdt.exe"

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Execution/detect-office-apps-spawn-msdt-CVE-2022-30190.yaml