
Summary
This detection rule is designed to identify suspicious command line flag combinations that are commonly associated with tools allowing privilege escalation, such as PsExec. The rule specifically looks for instances where command line arguments indicate an attempt to execute commands as different users (like 'system' or 'NT'), which can be a red flag for malicious activities. By monitoring the process creation logs for the Windows environment, the rule captures any command line inputs that include user and command flags that are indicative of such behavior. The rule consists of selections that check for specific user (target user) flags and command execution flags, ensuring that both selections must be satisfied to trigger an alert. This proactive monitoring can help security teams detect potential abuse of administrative privileges and unauthorized access attempts, thereby enhancing overall security posture.
Categories
- Windows
Data Sources
- Process
Created: 2022-11-11