
Summary
This detection rule identifies instances of PsExec.exe being executed with the `accepteula` flag in the command line. The significance of this flag lies in its association with first-time usage of PsExec, a tool frequently employed by attackers for executing commands on remote systems. By leveraging various data sources, including Sysmon EventID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2, the rule thresholds processes originating from endpoints to reveal potential malicious activity. A confirmed malicious execution of PsExec with this flag could indicate initial compromise, potentially leading to further exploitation and lateral movement within a network environment. For effective utilization, the detection requires comprehensive logging from Endpoint Detection and Response (EDR) solutions, with correct data model mappings according to the Splunk Common Information Model (CIM).
Categories
- Endpoint
Data Sources
- Pod
- Process
- Windows Registry
- Application Log
ATT&CK Techniques
- T1021
- T1021.002
Created: 2024-11-13