heroui logo

Suspicious Process Execution via Renamed PsExec Executable

Elastic Detection Rules

View Source
Summary
This rule detects suspicious activity from the PsExec service, which may have been renamed to avoid detection. PsExec is a tool that enables remote command execution on Windows systems, commonly utilized by administrators but also favored by attackers for lateral movement and evading defenses. The rule identifies when the PsExec service component (`Psexecsvc`) is executed under a custom name instead of its standard filename. This behavior typically indicates an attempt to bypass security systems that monitor for the original service name. Analysts are advised to check compliance with organizational policies regarding tool usage, investigate related alerts, and assess user account legitimacy in performing such operations.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
  • Cloud Service
ATT&CK Techniques
  • T1569
  • T1569.002
  • T1036
  • T1036.003
Created: 2020-08-14