heroui logo

HackTool - SharpImpersonation Execution

Sigma Rules

View Source
Summary
This detection rule identifies the execution of the SharpImpersonation tool, which is designed to manipulate user tokens on Windows machines. The tool can be executed remotely using methodologies like PsExec or WmiExec, or it can be run interactively on a compromised system. The rule uses a combination of file path matching and command line argument inspection to determine if SharpImpersonation has been launched. Specifically, it looks for the executable's presence (identified by its name) and scrutinizes command line parameters for indicators of usage, such as 'user' identifiers and relevant techniques that imply privilege escalation or impersonation activities. This makes it a powerful rule for identifying potentially malicious activity that could lead to unauthorized access or control of user sessions on Windows hosts.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-12-27