heroui logo

CSExec Service File Creation

Sigma Rules

View Source
Summary
This detection rule targets the malicious use of the CSExec service file, specifically the default filename `csexecsvc.exe`, which is often associated with unauthorized software installations. The presence of this file indicates that the CSExec service has been installed and potentially exploited, allowing remote code execution via the command line. The rule uses file event logs to detect the creation or modification of the service file on Windows systems. Given that CSExec can be employed by threat actors to execute commands remotely, this detection rule is crucial for identifying potential compromises. It is important for defenders to monitor file events related to the creation of this service file as part of a larger strategy to detect lateral movement and unauthorized access within the network.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2023-08-04