
Summary
The detection rule targets the usage of Sysinternals PsSuspend, a utility that can be manipulated to suspend critical system processes, which may facilitate attacker persistence and system manipulation tactics. It utilizes process creation logs to identify instances where 'pssuspend.exe' or 'pssuspend64.exe' are executed, as these are commonly used in malicious activities to pause essential processes temporarily. The detection logic specifically scans for the original filename and the image path to confirm a match, asserting a medium confidence level due to potential false positives associated with legitimate use cases. The rule is relevant for both security monitoring and forensic investigations in Windows environments, particularly when managing particular alerts tied to process and system integrity.
Categories
- Windows
- Endpoint
- Network
- Infrastructure
Data Sources
- Process
Created: 2023-03-23