heroui logo

Winrs Local Command Execution

Sigma Rules

View Source
Summary
The 'Winrs Local Command Execution' rule is designed to detect instances where Winrs.exe is used for executing commands locally on Windows systems. Winrs (Windows Remote Shell) is a command-line tool that allows for running commands on remote computers and can be exploited for lateral movement or evasion of security measures. When commands are executed via Winrs.exe, they run under the process Winrshost.exe. This detection rule monitors for specific patterns in the command-line invocation and executable images associated with Winrs to identify potentially malicious behavior. The rule employs conditions that combine detection of the Winrs executable with checks for local IP addresses, ensuring that only relevant instances are flagged. Given its focus on local command execution, it serves as an important mechanism to uncover tactics employed by attackers aiming to manipulate system processes without triggering direct alerts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2025-10-22