heroui logo

Windows NirSoft AdvancedRun

Splunk Security Content

View Source
Summary
The detection rule identifies the execution of `AdvancedRun.exe`, a utility comparable to remote administration tools such as PsExec. This tool allows users to configure and execute commands as different users, which can also be exploited for malicious purposes, including remote code execution and privilege escalation. This analytic leverages data from Endpoint Detection and Response (EDR) systems, specifically focusing on entries logged as processes and their command lines. By examining the process name and original file name, alongside common command-line parameters, the rule highlights potential threat activity. The significance of monitoring `AdvancedRun.exe` lies in its legitimate use versus exploitation potential, as threat actors might employ this program to maintain persistence, execute arbitrary commands, or automate configurations surreptitiously.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Windows Registry
  • Application Log
ATT&CK Techniques
  • T1588.002
Created: 2024-11-13